Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
6fRzgDuqWT.dll

Overview

General Information

Sample name:6fRzgDuqWT.dll
renamed because original name is a hash value
Original sample name:99fbd88dafad2ed4a82cc80f8b8eb8d4.dll
Analysis ID:1591514
MD5:99fbd88dafad2ed4a82cc80f8b8eb8d4
SHA1:e2023fcc0a9991c84fa24ea4f3285305514c52cb
SHA256:5b7edc95ab8033817fb07fee8e8f114be7f1873abcd69d07899ac60ae9b9763a
Tags:dllexeuser-mentality
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected Wannacry Ransomware
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Tries to download HTTP data from a sinkholed server
Yara detected Wannacry ransomware
AI detected suspicious sample
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 5676 cmdline: loaddll32.exe "C:\Users\user\Desktop\6fRzgDuqWT.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 3900 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3428 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\6fRzgDuqWT.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 4348 cmdline: rundll32.exe "C:\Users\user\Desktop\6fRzgDuqWT.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • mssecsvc.exe (PID: 3156 cmdline: C:\WINDOWS\mssecsvc.exe MD5: 8ED7F2E1AAE7A4371AA929A5EB6A6E59)
          • tasksche.exe (PID: 3760 cmdline: C:\WINDOWS\tasksche.exe /i MD5: 171E35FE5FD37CA850D3D1234D94E194)
    • rundll32.exe (PID: 2540 cmdline: rundll32.exe C:\Users\user\Desktop\6fRzgDuqWT.dll,PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 8 cmdline: rundll32.exe "C:\Users\user\Desktop\6fRzgDuqWT.dll",PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvc.exe (PID: 3684 cmdline: C:\WINDOWS\mssecsvc.exe MD5: 8ED7F2E1AAE7A4371AA929A5EB6A6E59)
        • tasksche.exe (PID: 4320 cmdline: C:\WINDOWS\tasksche.exe /i MD5: 171E35FE5FD37CA850D3D1234D94E194)
  • mssecsvc.exe (PID: 4296 cmdline: C:\WINDOWS\mssecsvc.exe -m security MD5: 8ED7F2E1AAE7A4371AA929A5EB6A6E59)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
6fRzgDuqWT.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    6fRzgDuqWT.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x45604:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x353d0:$x3: tasksche.exe
    • 0x455e0:$x3: tasksche.exe
    • 0x455bc:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x45634:$x5: WNcry@2ol7
    • 0x3543b:$x6: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
    • 0x3028:$x7: mssecsvc.exe
    • 0x120ac:$x7: mssecsvc.exe
    • 0x1b3b4:$x7: mssecsvc.exe
    • 0x353a8:$x8: C:\%s\qeriuwjhrf
    • 0x45604:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0x3014:$s1: C:\%s\%s
    • 0x12098:$s1: C:\%s\%s
    • 0x1b39c:$s1: C:\%s\%s
    • 0x353bc:$s1: C:\%s\%s
    • 0x45534:$s3: cmd.exe /c "%s"
    • 0x77a88:$s4: msg/m_portuguese.wnry
    • 0x326f0:$s5: \\192.168.56.20\IPC$
    • 0x1fae5:$s6: \\172.16.99.5\IPC$
    • 0xd195:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x78da:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    6fRzgDuqWT.dllwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x455e0:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x45608:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    SourceRuleDescriptionAuthorStrings
    C:\Windows\tasksche.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      C:\Windows\tasksche.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
      • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
      • 0xf4d8:$x3: tasksche.exe
      • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
      • 0xf52c:$x5: WNcry@2ol7
      • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
      • 0xf42c:$s3: cmd.exe /c "%s"
      • 0x41980:$s4: msg/m_portuguese.wnry
      • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
      • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
      • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
      C:\Windows\tasksche.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      C:\Windows\tasksche.exeWin32_Ransomware_WannaCryunknownReversingLabs
      • 0x2016:$main_2: 68 08 02 00 00 33 DB 50 53 FF 15 8C 80 40 00 68 AC F8 40 00 E8 F6 F1 FF FF 59 FF 15 6C 81 40 00 83 38 02 75 53 68 38 F5 40 00 FF 15 68 81 40 00 8B 00 FF 70 04 E8 F0 56 00 00 59 85 C0 59 75 38 ...
      • 0x77ba:$entrypoint_all: 55 8B EC 6A FF 68 88 D4 40 00 68 F4 76 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C4 81 40 00 59 83 0D 4C F9 40 00 FF 83 0D 50 F9 40 ...
      SourceRuleDescriptionAuthorStrings
      00000006.00000000.1852650304.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        0000000A.00000002.1882885243.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
        • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
        • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
        00000006.00000002.2501332748.000000000042E000.00000004.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          00000007.00000000.1860471973.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
          • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
          • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
          00000006.00000000.1852807546.0000000000710000.00000002.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
            Click to see the 24 entries
            SourceRuleDescriptionAuthorStrings
            6.2.mssecsvc.exe.23868c8.7.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
            • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
            • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
            • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
            6.2.mssecsvc.exe.23868c8.7.raw.unpackWin32_Ransomware_WannaCryunknownReversingLabs
            • 0x8140:$main_3: 83 EC 50 56 57 B9 0E 00 00 00 BE D0 13 43 00 8D 7C 24 08 33 C0 F3 A5 A4 89 44 24 41 89 44 24 45 89 44 24 49 89 44 24 4D 89 44 24 51 66 89 44 24 55 50 50 50 6A 01 50 88 44 24 6B FF 15 34 A1 40 ...
            • 0x8090:$start_service_3: 83 EC 10 68 04 01 00 00 68 60 F7 70 00 6A 00 FF 15 6C A0 40 00 FF 15 2C A1 40 00 83 38 02 7D 09 E8 6B FE FF FF 83 C4 10 C3 57 68 3F 00 0F 00 6A 00 6A 00 FF 15 10 A0 40 00 8B F8 85 FF 74 32 53 ...
            • 0x9a16:$entrypoint_all: 55 8B EC 6A FF 68 A0 A1 40 00 68 A2 9B 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C0 A0 40 00 59 83 0D 94 F8 70 00 FF 83 0D 98 F8 70 ...
            6.2.mssecsvc.exe.1e65084.2.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
            • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
            • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
            • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
            6.2.mssecsvc.exe.1e65084.2.raw.unpackWin32_Ransomware_WannaCryunknownReversingLabs
            • 0x8140:$main_3: 83 EC 50 56 57 B9 0E 00 00 00 BE D0 13 43 00 8D 7C 24 08 33 C0 F3 A5 A4 89 44 24 41 89 44 24 45 89 44 24 49 89 44 24 4D 89 44 24 51 66 89 44 24 55 50 50 50 6A 01 50 88 44 24 6B FF 15 34 A1 40 ...
            • 0x8090:$start_service_3: 83 EC 10 68 04 01 00 00 68 60 F7 70 00 6A 00 FF 15 6C A0 40 00 FF 15 2C A1 40 00 83 38 02 7D 09 E8 6B FE FF FF 83 C4 10 C3 57 68 3F 00 0F 00 6A 00 6A 00 FF 15 10 A0 40 00 8B F8 85 FF 74 32 53 ...
            • 0x9a16:$entrypoint_all: 55 8B EC 6A FF 68 A0 A1 40 00 68 A2 9B 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C0 A0 40 00 59 83 0D 94 F8 70 00 FF 83 0D 98 F8 70 ...
            6.2.mssecsvc.exe.23b896c.8.raw.unpackJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
              Click to see the 138 entries
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T02:52:18.963211+010020315153Misc activity104.16.167.22880192.168.2.449730TCP
              2025-01-15T02:52:19.653640+010020315153Misc activity104.16.167.22880192.168.2.449731TCP
              2025-01-15T02:52:21.842988+010020315153Misc activity104.16.167.22880192.168.2.449754TCP
              2025-01-15T02:54:25.857856+010020315153Misc activity104.16.167.22880192.168.2.450642TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T02:52:18.401214+010020242911A Network Trojan was detected192.168.2.4621351.1.1.153UDP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T02:52:18.961873+010020242981A Network Trojan was detected192.168.2.449730104.16.167.22880TCP
              2025-01-15T02:52:19.652913+010020242981A Network Trojan was detected192.168.2.449731104.16.167.22880TCP
              2025-01-15T02:52:21.841908+010020242981A Network Trojan was detected192.168.2.449754104.16.167.22880TCP
              2025-01-15T02:54:25.857726+010020242981A Network Trojan was detected192.168.2.450642104.16.167.22880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T02:52:18.961873+010020242991A Network Trojan was detected192.168.2.449730104.16.167.22880TCP
              2025-01-15T02:52:19.652913+010020242991A Network Trojan was detected192.168.2.449731104.16.167.22880TCP
              2025-01-15T02:52:21.841908+010020242991A Network Trojan was detected192.168.2.449754104.16.167.22880TCP
              2025-01-15T02:54:25.857726+010020242991A Network Trojan was detected192.168.2.450642104.16.167.22880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T02:52:18.961873+010020243011A Network Trojan was detected192.168.2.449730104.16.167.22880TCP
              2025-01-15T02:52:19.652913+010020243011A Network Trojan was detected192.168.2.449731104.16.167.22880TCP
              2025-01-15T02:52:21.841908+010020243011A Network Trojan was detected192.168.2.449754104.16.167.22880TCP
              2025-01-15T02:54:25.857726+010020243011A Network Trojan was detected192.168.2.450642104.16.167.22880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T02:52:18.961873+010020243021A Network Trojan was detected192.168.2.449730104.16.167.22880TCP
              2025-01-15T02:52:19.652913+010020243021A Network Trojan was detected192.168.2.449731104.16.167.22880TCP
              2025-01-15T02:52:21.841908+010020243021A Network Trojan was detected192.168.2.449754104.16.167.22880TCP
              2025-01-15T02:54:25.857726+010020243021A Network Trojan was detected192.168.2.450642104.16.167.22880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T02:52:18.961873+010028033043Unknown Traffic192.168.2.449730104.16.167.22880TCP
              2025-01-15T02:52:19.652913+010028033043Unknown Traffic192.168.2.449731104.16.167.22880TCP
              2025-01-15T02:52:21.841908+010028033043Unknown Traffic192.168.2.449754104.16.167.22880TCP
              2025-01-15T02:54:25.857726+010028033043Unknown Traffic192.168.2.450642104.16.167.22880TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 6fRzgDuqWT.dllAvira: detected
              Source: C:\Windows\tasksche.exeAvira: detection malicious, Label: TR/Ransom.Gen
              Source: C:\WINDOWS\qeriuwjhrf (copy)ReversingLabs: Detection: 97%
              Source: C:\Windows\tasksche.exeReversingLabs: Detection: 97%
              Source: 6fRzgDuqWT.dllReversingLabs: Detection: 94%
              Source: 6fRzgDuqWT.dllVirustotal: Detection: 91%Perma Link
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
              Source: C:\Windows\tasksche.exeJoe Sandbox ML: detected
              Source: 6fRzgDuqWT.dllJoe Sandbox ML: detected
              Source: C:\Windows\tasksche.exeCode function: 7_2_004018B9 CryptReleaseContext,7_2_004018B9

              Exploits

              barindex
              Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
              Source: 6fRzgDuqWT.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.4:49754 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.4:49730 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.4:49730 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.4:49754 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.4:49731 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.4:49754 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.4:49730 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.4:49731 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.4:49731 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.4:49731 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.4:49754 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.4:49730 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.4:50642 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.4:50642 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.4:50642 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.4:50642 -> 104.16.167.228:80
              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 01:52:18 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 902239c60f494367-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 01:52:19 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 902239ca6b9c41a6-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 01:52:21 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 902239d8098e7289-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 01:54:25 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 90223cdf3866ef9f-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: Network trafficSuricata IDS: 2024291 - Severity 1 - ET MALWARE Possible WannaCry DNS Lookup 1 : 192.168.2.4:62135 -> 1.1.1.1:53
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:49754 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:49730 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:49731 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.4:49754
              Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.4:49730
              Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.4:49731
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:50642 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.4:50642
              Source: unknownTCP traffic detected without corresponding DNS query: 36.159.231.192
              Source: unknownTCP traffic detected without corresponding DNS query: 36.159.231.192
              Source: unknownTCP traffic detected without corresponding DNS query: 36.159.231.192
              Source: unknownTCP traffic detected without corresponding DNS query: 36.159.231.1
              Source: unknownTCP traffic detected without corresponding DNS query: 36.159.231.1
              Source: unknownTCP traffic detected without corresponding DNS query: 36.159.231.192
              Source: unknownTCP traffic detected without corresponding DNS query: 36.159.231.1
              Source: unknownTCP traffic detected without corresponding DNS query: 36.159.231.1
              Source: unknownTCP traffic detected without corresponding DNS query: 36.159.231.1
              Source: unknownTCP traffic detected without corresponding DNS query: 36.159.231.1
              Source: unknownTCP traffic detected without corresponding DNS query: 36.159.231.1
              Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
              Source: unknownTCP traffic detected without corresponding DNS query: 134.23.254.149
              Source: unknownTCP traffic detected without corresponding DNS query: 134.23.254.149
              Source: unknownTCP traffic detected without corresponding DNS query: 134.23.254.149
              Source: unknownTCP traffic detected without corresponding DNS query: 134.23.254.1
              Source: unknownTCP traffic detected without corresponding DNS query: 134.23.254.149
              Source: unknownTCP traffic detected without corresponding DNS query: 134.23.254.1
              Source: unknownTCP traffic detected without corresponding DNS query: 134.23.254.1
              Source: unknownTCP traffic detected without corresponding DNS query: 134.23.254.1
              Source: unknownTCP traffic detected without corresponding DNS query: 134.23.254.1
              Source: unknownTCP traffic detected without corresponding DNS query: 134.23.254.1
              Source: unknownTCP traffic detected without corresponding DNS query: 134.23.254.1
              Source: unknownTCP traffic detected without corresponding DNS query: 41.203.92.99
              Source: unknownTCP traffic detected without corresponding DNS query: 41.203.92.99
              Source: unknownTCP traffic detected without corresponding DNS query: 41.203.92.99
              Source: unknownTCP traffic detected without corresponding DNS query: 41.203.92.1
              Source: unknownTCP traffic detected without corresponding DNS query: 41.203.92.99
              Source: unknownTCP traffic detected without corresponding DNS query: 41.203.92.1
              Source: unknownTCP traffic detected without corresponding DNS query: 41.203.92.1
              Source: unknownTCP traffic detected without corresponding DNS query: 41.203.92.1
              Source: unknownTCP traffic detected without corresponding DNS query: 41.203.92.1
              Source: unknownTCP traffic detected without corresponding DNS query: 41.203.92.1
              Source: unknownTCP traffic detected without corresponding DNS query: 41.203.92.1
              Source: unknownTCP traffic detected without corresponding DNS query: 166.216.208.196
              Source: unknownTCP traffic detected without corresponding DNS query: 166.216.208.196
              Source: unknownTCP traffic detected without corresponding DNS query: 166.216.208.196
              Source: unknownTCP traffic detected without corresponding DNS query: 166.216.208.1
              Source: unknownTCP traffic detected without corresponding DNS query: 166.216.208.1
              Source: unknownTCP traffic detected without corresponding DNS query: 166.216.208.1
              Source: unknownTCP traffic detected without corresponding DNS query: 166.216.208.196
              Source: unknownTCP traffic detected without corresponding DNS query: 166.216.208.1
              Source: unknownTCP traffic detected without corresponding DNS query: 166.216.208.1
              Source: unknownTCP traffic detected without corresponding DNS query: 166.216.208.1
              Source: unknownTCP traffic detected without corresponding DNS query: 166.216.208.1
              Source: unknownTCP traffic detected without corresponding DNS query: 138.194.222.1
              Source: unknownTCP traffic detected without corresponding DNS query: 138.194.222.1
              Source: unknownTCP traffic detected without corresponding DNS query: 138.194.222.1
              Source: unknownTCP traffic detected without corresponding DNS query: 138.194.222.1
              Source: unknownTCP traffic detected without corresponding DNS query: 138.194.222.1
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficDNS traffic detected: DNS query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
              Source: tasksche.exe.5.drString found in binary or memory: http://data-vocabulary.org/Breadcrumb
              Source: mssecsvc.exe, 00000005.00000000.1844907765.0000000000915000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2501553870.0000000000915000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2503094839.000000000209C000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 00000009.00000002.1883678863.0000000000915000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000A.00000002.1882912171.0000000000605000.00000002.00000001.01000000.00000007.sdmp, 6fRzgDuqWT.dll, tasksche.exe.5.drString found in binary or memory: http://en.quizzstar.com/favicon-32x32.png
              Source: mssecsvc.exe, 00000005.00000000.1844907765.0000000000915000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2501553870.0000000000915000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2503094839.000000000209C000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 00000009.00000002.1883678863.0000000000915000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000A.00000002.1882912171.0000000000605000.00000002.00000001.01000000.00000007.sdmp, 6fRzgDuqWT.dll, tasksche.exe.5.drString found in binary or memory: http://en.quizzstar.com/favicon-32x32.pnghttp://en.quizzstar.com/favicon-32x32.pngDBOvbRnA0r7fFxR933
              Source: mssecsvc.exe, 00000005.00000000.1844907765.0000000000915000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2501553870.0000000000915000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2503094839.000000000209C000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 00000009.00000002.1883678863.0000000000915000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000A.00000002.1882912171.0000000000605000.00000002.00000001.01000000.00000007.sdmp, 6fRzgDuqWT.dll, tasksche.exe.5.drString found in binary or memory: http://en.quizzstar.com/favicon-32x32.pnghttp://en.quizzstar.com/favicon-32x32.pngHC9QBbNgt0ex2OTdhp
              Source: 6fRzgDuqWT.dllString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
              Source: mssecsvc.exe, 00000009.00000002.1884375731.0000000000BF8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com-jz13
              Source: mssecsvc.exe, 00000009.00000002.1884375731.0000000000C2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/
              Source: mssecsvc.exe, 00000006.00000002.2502415603.0000000000BDA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/-
              Source: mssecsvc.exe, 00000006.00000002.2502415603.0000000000BDA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/9
              Source: mssecsvc.exe, 00000005.00000002.1862621817.0000000000C0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/L
              Source: mssecsvc.exe, 00000009.00000002.1884375731.0000000000C2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/Q
              Source: mssecsvc.exe, 00000009.00000002.1884375731.0000000000C2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/T
              Source: mssecsvc.exe, 00000005.00000002.1862621817.0000000000C0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comI
              Source: mssecsvc.exe, 00000006.00000002.2501094490.000000000019D000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJ
              Source: mssecsvc.exe, 00000006.00000002.2502415603.0000000000BB8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com_
              Source: mssecsvc.exe, 00000005.00000000.1844907765.0000000000915000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2501553870.0000000000915000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2503094839.000000000209C000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 00000009.00000002.1883678863.0000000000915000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000A.00000002.1882912171.0000000000605000.00000002.00000001.01000000.00000007.sdmp, 6fRzgDuqWT.dll, tasksche.exe.5.drString found in binary or memory: http://www.livestrong.com/article/167968-diseases-caused-by-malnutrition-in-children/
              Source: mssecsvc.exe, 00000005.00000000.1844907765.0000000000915000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2501553870.0000000000915000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2503094839.000000000209C000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 00000009.00000002.1883678863.0000000000915000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000A.00000002.1882912171.0000000000605000.00000002.00000001.01000000.00000007.sdmp, 6fRzgDuqWT.dll, tasksche.exe.5.drString found in binary or memory: http://www.motivationalstoriesinhindi.in/favicon.ico
              Source: mssecsvc.exe, 00000005.00000000.1844907765.0000000000915000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2501553870.0000000000915000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2503094839.000000000209C000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 00000009.00000002.1883678863.0000000000915000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000A.00000002.1882912171.0000000000605000.00000002.00000001.01000000.00000007.sdmp, 6fRzgDuqWT.dll, tasksche.exe.5.drString found in binary or memory: http://www.motivationalstoriesinhindi.in/favicon.icohttp://www.motivationalstoriesinhindi.in/favicon
              Source: 6fRzgDuqWT.dll, tasksche.exe.5.drString found in binary or memory: https://img1a.flixcart.com/www/promos/new/20150528-140547-favicon-retina.ico
              Source: 6fRzgDuqWT.dll, tasksche.exe.5.drString found in binary or memory: https://img1a.flixcart.com/www/promos/new/20150528-140547-favicon-retina.icohttps://img1a.flixcart.c
              Source: tasksche.exe.5.drString found in binary or memory: https://www.google.co.in/
              Source: tasksche.exe.5.drString found in binary or memory: https://www.google.co.in/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&ved=0ahUKEwidqcG_
              Source: mssecsvc.exe, 00000009.00000002.1884375731.0000000000C4F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.kryptoslogic.com
              Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443

              Spam, unwanted Advertisements and Ransom Demands

              barindex
              Source: C:\Windows\tasksche.exeCode function: CreateFileA,GetFileSizeEx,memcmp,GlobalAlloc,_local_unwind2, WANACRY!7_2_004014A6
              Source: Yara matchFile source: 6fRzgDuqWT.dll, type: SAMPLE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.23b896c.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.1e97128.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.2395948.9.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.1e97128.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.1e74104.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.23b896c.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.1e74104.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.23868c8.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.1e65084.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.2395948.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.1e700a4.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.23918e8.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000006.00000000.1852650304.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.2501332748.000000000042E000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000000.1852807546.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.1861807815.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.1883526347.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000000.1844779969.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.2501553870.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000000.1874333901.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.2503584791.0000000002395000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.1861978439.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000000.1844907765.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000000.1874498033.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.2503094839.0000000001E74000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.1883678863.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 3156, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 4296, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 3684, type: MEMORYSTR
              Source: Yara matchFile source: C:\Windows\tasksche.exe, type: DROPPED

              System Summary

              barindex
              Source: 6fRzgDuqWT.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6fRzgDuqWT.dll, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.23868c8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.23868c8.7.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.1e65084.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.1e65084.2.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.23b896c.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.23b896c.8.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.23b896c.8.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.1e97128.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.1e97128.4.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.1e97128.4.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.2395948.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.2395948.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 6.2.mssecsvc.exe.2395948.9.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.1e97128.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.1e97128.4.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.1e97128.4.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.1e74104.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.1e74104.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 6.2.mssecsvc.exe.1e74104.5.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.23b896c.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.23b896c.8.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.23b896c.8.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.1e74104.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.1e74104.5.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.23868c8.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.23868c8.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 6.2.mssecsvc.exe.23868c8.7.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.1e65084.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.1e65084.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 6.2.mssecsvc.exe.1e65084.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.1e65084.2.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.2395948.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.2395948.9.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.1e700a4.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.1e700a4.3.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.23918e8.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.23918e8.6.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000A.00000002.1882885243.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000007.00000000.1860471973.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000006.00000000.1852807546.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000A.00000000.1882223401.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000007.00000002.1861089199.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000006.00000002.2501553870.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000006.00000002.2503584791.0000000002395000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000005.00000002.1861978439.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000005.00000000.1844907765.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000009.00000000.1874498033.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000006.00000002.2503094839.0000000001E74000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000009.00000002.1883678863.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
              Source: C:\Windows\tasksche.exeCode function: 7_2_00406C407_2_00406C40
              Source: C:\Windows\tasksche.exeCode function: 7_2_00402A767_2_00402A76
              Source: C:\Windows\tasksche.exeCode function: 7_2_00402E7E7_2_00402E7E
              Source: C:\Windows\tasksche.exeCode function: 7_2_0040350F7_2_0040350F
              Source: C:\Windows\tasksche.exeCode function: 7_2_00404C197_2_00404C19
              Source: C:\Windows\tasksche.exeCode function: 7_2_0040541F7_2_0040541F
              Source: C:\Windows\tasksche.exeCode function: 7_2_004037977_2_00403797
              Source: C:\Windows\tasksche.exeCode function: 7_2_004043B77_2_004043B7
              Source: C:\Windows\tasksche.exeCode function: 7_2_004031BC7_2_004031BC
              Source: tasksche.exe.5.drStatic PE information: Resource name: XIA type: Zip archive data, at least v2.0 to extract, compression method=deflate
              Source: 6fRzgDuqWT.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
              Source: 6fRzgDuqWT.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6fRzgDuqWT.dll, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.23868c8.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.23868c8.7.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.1e65084.2.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.1e65084.2.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.23b896c.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.23b896c.8.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.23b896c.8.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.1e97128.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.1e97128.4.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.1e97128.4.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.2395948.9.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.2395948.9.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 6.2.mssecsvc.exe.2395948.9.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.1e97128.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.1e97128.4.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.1e97128.4.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.1e74104.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.1e74104.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 6.2.mssecsvc.exe.1e74104.5.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.23b896c.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.23b896c.8.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.23b896c.8.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.1e74104.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.1e74104.5.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.23868c8.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.23868c8.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 6.2.mssecsvc.exe.23868c8.7.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.1e65084.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.1e65084.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 6.2.mssecsvc.exe.1e65084.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.1e65084.2.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.2395948.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.2395948.9.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.1e700a4.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.1e700a4.3.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.23918e8.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.23918e8.6.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000A.00000002.1882885243.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000007.00000000.1860471973.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000006.00000000.1852807546.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000A.00000000.1882223401.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000007.00000002.1861089199.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000006.00000002.2501553870.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000006.00000002.2503584791.0000000002395000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000005.00000002.1861978439.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000005.00000000.1844907765.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000009.00000000.1874498033.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000006.00000002.2503094839.0000000001E74000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000009.00000002.1883678863.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: tasksche.exe, 00000007.00000000.1860471973.000000000040E000.00000008.00000001.01000000.00000007.sdmp, tasksche.exe, 0000000A.00000002.1882885243.000000000040E000.00000008.00000001.01000000.00000007.sdmp, 6fRzgDuqWT.dll, tasksche.exe.5.drBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
              Source: classification engineClassification label: mal100.rans.expl.evad.winDLL@20/2@1/100
              Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
              Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
              Source: C:\Windows\tasksche.exeCode function: OpenSCManagerA,OpenServiceA,StartServiceA,CloseServiceHandle,sprintf,CreateServiceA,StartServiceA,CloseServiceHandle,CloseServiceHandle,7_2_00401CE8
              Source: C:\Windows\mssecsvc.exeCode function: 5_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,CreateFileA,WriteFile,CloseHandle,CreateProcessA,CloseHandle,CloseHandle,5_2_00407CE0
              Source: C:\Windows\mssecsvc.exeCode function: 5_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
              Source: C:\Windows\mssecsvc.exeCode function: 5_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,5_2_00408090
              Source: C:\Windows\mssecsvc.exeCode function: 6_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,6_2_00408090
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3900:120:WilError_03
              Source: 6fRzgDuqWT.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\6fRzgDuqWT.dll,PlayGame
              Source: 6fRzgDuqWT.dllReversingLabs: Detection: 94%
              Source: 6fRzgDuqWT.dllVirustotal: Detection: 91%
              Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\6fRzgDuqWT.dll"
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\6fRzgDuqWT.dll",#1
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\6fRzgDuqWT.dll,PlayGame
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\6fRzgDuqWT.dll",#1
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
              Source: unknownProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe -m security
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\6fRzgDuqWT.dll",PlayGame
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\6fRzgDuqWT.dll",#1Jump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\6fRzgDuqWT.dll,PlayGameJump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\6fRzgDuqWT.dll",PlayGameJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\6fRzgDuqWT.dll",#1Jump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
              Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
              Source: 6fRzgDuqWT.dllStatic file information: File size 5267459 > 1048576
              Source: 6fRzgDuqWT.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000
              Source: C:\Windows\tasksche.exeCode function: 7_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,7_2_00401A45
              Source: C:\Windows\tasksche.exeCode function: 7_2_00407710 push eax; ret 7_2_0040773E
              Source: C:\Windows\tasksche.exeCode function: 7_2_004076C8 push eax; ret 7_2_004076E6

              Persistence and Installation Behavior

              barindex
              Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeExecutable created and started: C:\WINDOWS\tasksche.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
              Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
              Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
              Source: C:\Windows\mssecsvc.exeCode function: 5_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 5828Thread sleep count: 94 > 30Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 5828Thread sleep time: -188000s >= -30000sJump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 5492Thread sleep count: 125 > 30Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 5492Thread sleep count: 44 > 30Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 5828Thread sleep time: -86400000s >= -30000sJump to behavior
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
              Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
              Source: mssecsvc.exe, 00000005.00000002.1862621817.0000000000C69000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000005.00000002.1862621817.0000000000C39000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.2502415603.0000000000BB8000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.2502415603.0000000000BDA000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.2502415603.0000000000C0A000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000009.00000002.1884375731.0000000000BF8000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000009.00000002.1884375731.0000000000C4F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: C:\Windows\tasksche.exeCode function: 7_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,7_2_00401A45
              Source: C:\Windows\tasksche.exeCode function: 7_2_004029CC free,GetProcessHeap,HeapFree,7_2_004029CC
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\6fRzgDuqWT.dll",#1Jump to behavior
              Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
              Service Execution
              4
              Windows Service
              4
              Windows Service
              12
              Masquerading
              OS Credential Dumping1
              Network Share Discovery
              Remote Services1
              Archive Collected Data
              22
              Encrypted Channel
              Exfiltration Over Other Network Medium1
              Data Encrypted for Impact
              CredentialsDomainsDefault Accounts1
              Native API
              1
              DLL Side-Loading
              11
              Process Injection
              21
              Virtualization/Sandbox Evasion
              LSASS Memory111
              Security Software Discovery
              Remote Desktop ProtocolData from Removable Media11
              Ingress Tool Transfer
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
              DLL Side-Loading
              11
              Process Injection
              Security Account Manager21
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared Drive2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              Obfuscated Files or Information
              NTDS2
              System Information Discovery
              Distributed Component Object ModelInput Capture3
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Rundll32
              LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1591514 Sample: 6fRzgDuqWT.dll Startdate: 15/01/2025 Architecture: WINDOWS Score: 100 43 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com 2->43 53 Tries to download HTTP data from a sinkholed server 2->53 55 Suricata IDS alerts for network traffic 2->55 57 Malicious sample detected (through community Yara rule) 2->57 59 6 other signatures 2->59 10 loaddll32.exe 1 2->10         started        12 mssecsvc.exe 2->12         started        signatures3 process4 dnsIp5 16 cmd.exe 1 10->16         started        18 rundll32.exe 10->18         started        21 conhost.exe 10->21         started        23 rundll32.exe 1 10->23         started        45 192.168.2.102 unknown unknown 12->45 47 192.168.2.103 unknown unknown 12->47 49 98 other IPs or domains 12->49 71 Connects to many different private IPs via SMB (likely to spread or exploit) 12->71 73 Connects to many different private IPs (likely to spread or exploit) 12->73 signatures6 process7 signatures8 25 rundll32.exe 16->25         started        51 Drops executables to the windows directory (C:\Windows) and starts them 18->51 27 mssecsvc.exe 7 18->27         started        process9 file10 31 mssecsvc.exe 7 25->31         started        39 C:\WINDOWS\qeriuwjhrf (copy), PE32 27->39 dropped 69 Drops executables to the windows directory (C:\Windows) and starts them 27->69 34 tasksche.exe 27->34         started        signatures11 process12 file13 41 C:\Windows\tasksche.exe, PE32 31->41 dropped 36 tasksche.exe 31->36         started        process14 signatures15 61 Detected Wannacry Ransomware 36->61 63 Antivirus detection for dropped file 36->63 65 Multi AV Scanner detection for dropped file 36->65 67 Machine Learning detection for dropped file 36->67

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              6fRzgDuqWT.dll95%ReversingLabsWin32.Ransomware.WannaCry
              6fRzgDuqWT.dll91%VirustotalBrowse
              6fRzgDuqWT.dll100%AviraTR/Ransom.Gen
              6fRzgDuqWT.dll100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Windows\tasksche.exe100%AviraTR/Ransom.Gen
              C:\Windows\tasksche.exe100%Joe Sandbox ML
              C:\WINDOWS\qeriuwjhrf (copy)98%ReversingLabsWin32.Ransomware.WannaCry
              C:\Windows\tasksche.exe98%ReversingLabsWin32.Ransomware.WannaCry
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://en.quizzstar.com/favicon-32x32.pnghttp://en.quizzstar.com/favicon-32x32.pngDBOvbRnA0r7fFxR9330%Avira URL Cloudsafe
              http://www.motivationalstoriesinhindi.in/favicon.icohttp://www.motivationalstoriesinhindi.in/favicon0%Avira URL Cloudsafe
              http://en.quizzstar.com/favicon-32x32.png0%Avira URL Cloudsafe
              http://data-vocabulary.org/Breadcrumb0%Avira URL Cloudsafe
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com-jz130%Avira URL Cloudsafe
              http://www.motivationalstoriesinhindi.in/favicon.ico0%Avira URL Cloudsafe
              http://en.quizzstar.com/favicon-32x32.pnghttp://en.quizzstar.com/favicon-32x32.pngHC9QBbNgt0ex2OTdhp0%Avira URL Cloudsafe
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com_0%Avira URL Cloudsafe
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comI0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
              104.16.167.228
              truefalse
                high
                NameMaliciousAntivirus DetectionReputation
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/false
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com6fRzgDuqWT.dllfalse
                    high
                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/Qmssecsvc.exe, 00000009.00000002.1884375731.0000000000C2D000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/Lmssecsvc.exe, 00000005.00000002.1862621817.0000000000C0E000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://www.livestrong.com/article/167968-diseases-caused-by-malnutrition-in-children/mssecsvc.exe, 00000005.00000000.1844907765.0000000000915000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2501553870.0000000000915000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2503094839.000000000209C000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 00000009.00000002.1883678863.0000000000915000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000A.00000002.1882912171.0000000000605000.00000002.00000001.01000000.00000007.sdmp, 6fRzgDuqWT.dll, tasksche.exe.5.drfalse
                          high
                          http://data-vocabulary.org/Breadcrumbtasksche.exe.5.drfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/-mssecsvc.exe, 00000006.00000002.2502415603.0000000000BDA000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://www.motivationalstoriesinhindi.in/favicon.icohttp://www.motivationalstoriesinhindi.in/faviconmssecsvc.exe, 00000005.00000000.1844907765.0000000000915000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2501553870.0000000000915000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2503094839.000000000209C000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 00000009.00000002.1883678863.0000000000915000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000A.00000002.1882912171.0000000000605000.00000002.00000001.01000000.00000007.sdmp, 6fRzgDuqWT.dll, tasksche.exe.5.drfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://www.google.co.in/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&ved=0ahUKEwidqcG_tasksche.exe.5.drfalse
                              high
                              http://en.quizzstar.com/favicon-32x32.pnghttp://en.quizzstar.com/favicon-32x32.pngDBOvbRnA0r7fFxR933mssecsvc.exe, 00000005.00000000.1844907765.0000000000915000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2501553870.0000000000915000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2503094839.000000000209C000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 00000009.00000002.1883678863.0000000000915000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000A.00000002.1882912171.0000000000605000.00000002.00000001.01000000.00000007.sdmp, 6fRzgDuqWT.dll, tasksche.exe.5.drfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://en.quizzstar.com/favicon-32x32.pngmssecsvc.exe, 00000005.00000000.1844907765.0000000000915000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2501553870.0000000000915000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2503094839.000000000209C000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 00000009.00000002.1883678863.0000000000915000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000A.00000002.1882912171.0000000000605000.00000002.00000001.01000000.00000007.sdmp, 6fRzgDuqWT.dll, tasksche.exe.5.drfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com-jz13mssecsvc.exe, 00000009.00000002.1884375731.0000000000BF8000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://www.kryptoslogic.commssecsvc.exe, 00000009.00000002.1884375731.0000000000C4F000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com_mssecsvc.exe, 00000006.00000002.2502415603.0000000000BB8000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://en.quizzstar.com/favicon-32x32.pnghttp://en.quizzstar.com/favicon-32x32.pngHC9QBbNgt0ex2OTdhpmssecsvc.exe, 00000005.00000000.1844907765.0000000000915000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2501553870.0000000000915000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2503094839.000000000209C000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 00000009.00000002.1883678863.0000000000915000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000A.00000002.1882912171.0000000000605000.00000002.00000001.01000000.00000007.sdmp, 6fRzgDuqWT.dll, tasksche.exe.5.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://img1a.flixcart.com/www/promos/new/20150528-140547-favicon-retina.icohttps://img1a.flixcart.c6fRzgDuqWT.dll, tasksche.exe.5.drfalse
                                  high
                                  http://www.motivationalstoriesinhindi.in/favicon.icomssecsvc.exe, 00000005.00000000.1844907765.0000000000915000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2501553870.0000000000915000.00000002.00000001.01000000.00000004.sdmp, mssecsvc.exe, 00000006.00000002.2503094839.000000000209C000.00000004.00000020.00020000.00000000.sdmp, tasksche.exe, 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmp, mssecsvc.exe, 00000009.00000002.1883678863.0000000000915000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe, 0000000A.00000002.1882912171.0000000000605000.00000002.00000001.01000000.00000007.sdmp, 6fRzgDuqWT.dll, tasksche.exe.5.drfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/9mssecsvc.exe, 00000006.00000002.2502415603.0000000000BDA000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://img1a.flixcart.com/www/promos/new/20150528-140547-favicon-retina.ico6fRzgDuqWT.dll, tasksche.exe.5.drfalse
                                      high
                                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/Tmssecsvc.exe, 00000009.00000002.1884375731.0000000000C2D000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comImssecsvc.exe, 00000005.00000002.1862621817.0000000000C0E000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJmssecsvc.exe, 00000006.00000002.2501094490.000000000019D000.00000004.00000010.00020000.00000000.sdmpfalse
                                          high
                                          https://www.google.co.in/tasksche.exe.5.drfalse
                                            high
                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs
                                            IPDomainCountryFlagASNASN NameMalicious
                                            132.89.40.1
                                            unknownUnited States
                                            306DNIC-ASBLK-00306-00371USfalse
                                            155.84.144.1
                                            unknownUnited States
                                            4010DNIC-AS-04010USfalse
                                            119.78.29.114
                                            unknownChina
                                            7497CSTNET-AS-APComputerNetworkInformationCenterCNfalse
                                            41.203.92.1
                                            unknownNigeria
                                            37148globacom-asNGfalse
                                            41.203.92.2
                                            unknownNigeria
                                            37148globacom-asNGfalse
                                            137.69.251.35
                                            unknownUnited States
                                            1781KAIST-DAEJEON-AS-KRKoreaAdvancedInstituteofScienceandfalse
                                            60.232.169.1
                                            unknownChina
                                            24143CNNIC-QCN-APQingdaoCableTVNetworkCenterCNfalse
                                            60.232.169.2
                                            unknownChina
                                            24143CNNIC-QCN-APQingdaoCableTVNetworkCenterCNfalse
                                            181.107.70.1
                                            unknownArgentina
                                            7303TelecomArgentinaSAARfalse
                                            193.32.83.1
                                            unknownUnited Kingdom
                                            49100IR-THR-PTEIRfalse
                                            105.86.166.1
                                            unknownEgypt
                                            36992ETISALAT-MISREGfalse
                                            36.159.231.1
                                            unknownChina
                                            9808CMNET-GDGuangdongMobileCommunicationCoLtdCNfalse
                                            134.23.254.149
                                            unknownUnited States
                                            10702INL-ASUSfalse
                                            168.221.244.71
                                            unknownUnited States
                                            20214COMCAST-20214USfalse
                                            41.203.92.99
                                            unknownNigeria
                                            37148globacom-asNGfalse
                                            36.159.231.2
                                            unknownChina
                                            9808CMNET-GDGuangdongMobileCommunicationCoLtdCNfalse
                                            184.52.7.196
                                            unknownUnited States
                                            6621HNS-DIRECPCUSfalse
                                            193.32.83.8
                                            unknownUnited Kingdom
                                            49100IR-THR-PTEIRfalse
                                            26.174.0.83
                                            unknownUnited States
                                            7922COMCAST-7922USfalse
                                            201.23.224.251
                                            unknownBrazil
                                            21571MLSWirelessSABRfalse
                                            60.232.169.61
                                            unknownChina
                                            24143CNNIC-QCN-APQingdaoCableTVNetworkCenterCNfalse
                                            166.216.208.2
                                            unknownUnited States
                                            20057ATT-MOBILITY-LLC-AS20057USfalse
                                            166.216.208.1
                                            unknownUnited States
                                            20057ATT-MOBILITY-LLC-AS20057USfalse
                                            107.95.115.109
                                            unknownUnited States
                                            20057ATT-MOBILITY-LLC-AS20057USfalse
                                            107.95.115.1
                                            unknownUnited States
                                            20057ATT-MOBILITY-LLC-AS20057USfalse
                                            105.86.166.51
                                            unknownEgypt
                                            36992ETISALAT-MISREGfalse
                                            125.213.129.60
                                            unknownIndonesia
                                            38513LINTASARTA-AS-IDPTAplikanusaLintasartaIDfalse
                                            IP
                                            192.168.2.148
                                            192.168.2.149
                                            192.168.2.146
                                            192.168.2.147
                                            192.168.2.140
                                            192.168.2.141
                                            192.168.2.144
                                            192.168.2.145
                                            192.168.2.142
                                            192.168.2.143
                                            192.168.2.159
                                            192.168.2.157
                                            192.168.2.158
                                            192.168.2.151
                                            192.168.2.152
                                            192.168.2.150
                                            192.168.2.155
                                            192.168.2.156
                                            192.168.2.153
                                            192.168.2.154
                                            192.168.2.126
                                            192.168.2.247
                                            192.168.2.127
                                            192.168.2.248
                                            192.168.2.124
                                            192.168.2.245
                                            192.168.2.125
                                            192.168.2.246
                                            192.168.2.128
                                            192.168.2.249
                                            192.168.2.129
                                            192.168.2.240
                                            192.168.2.122
                                            192.168.2.243
                                            192.168.2.123
                                            192.168.2.244
                                            192.168.2.120
                                            192.168.2.241
                                            192.168.2.121
                                            192.168.2.242
                                            192.168.2.97
                                            192.168.2.137
                                            192.168.2.96
                                            192.168.2.138
                                            192.168.2.99
                                            192.168.2.135
                                            192.168.2.98
                                            192.168.2.136
                                            192.168.2.139
                                            192.168.2.250
                                            192.168.2.130
                                            192.168.2.251
                                            192.168.2.91
                                            192.168.2.90
                                            192.168.2.93
                                            192.168.2.133
                                            192.168.2.254
                                            192.168.2.92
                                            192.168.2.134
                                            192.168.2.95
                                            192.168.2.131
                                            192.168.2.252
                                            192.168.2.94
                                            192.168.2.132
                                            192.168.2.253
                                            192.168.2.104
                                            192.168.2.225
                                            192.168.2.105
                                            192.168.2.226
                                            192.168.2.102
                                            192.168.2.223
                                            192.168.2.103
                                            192.168.2.224
                                            Joe Sandbox version:42.0.0 Malachite
                                            Analysis ID:1591514
                                            Start date and time:2025-01-15 02:51:09 +01:00
                                            Joe Sandbox product:CloudBasic
                                            Overall analysis duration:0h 5m 52s
                                            Hypervisor based Inspection enabled:false
                                            Report type:full
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                            Number of analysed new started processes analysed:15
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Sample name:6fRzgDuqWT.dll
                                            renamed because original name is a hash value
                                            Original Sample Name:99fbd88dafad2ed4a82cc80f8b8eb8d4.dll
                                            Detection:MAL
                                            Classification:mal100.rans.expl.evad.winDLL@20/2@1/100
                                            EGA Information:
                                            • Successful, ratio: 66.7%
                                            HCA Information:Failed
                                            Cookbook Comments:
                                            • Found application associated with file extension: .dll
                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                            • Excluded IPs from analysis (whitelisted): 2.22.50.144, 2.17.190.73, 172.202.163.200, 13.107.246.45
                                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                            • Execution Graph export aborted for target tasksche.exe, PID 3760 because there are no executed function
                                            • Not all processes where analyzed, report is missing behavior information
                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                            TimeTypeDescription
                                            20:52:20API Interceptor1x Sleep call for process: loaddll32.exe modified
                                            20:52:53API Interceptor112x Sleep call for process: mssecsvc.exe modified
                                            No context
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com9kNjKSEUym.dllGet hashmaliciousWannacryBrowse
                                            • 104.16.166.228
                                            v9xYj92wR3.dllGet hashmaliciousWannacryBrowse
                                            • 104.16.167.228
                                            bopY0ot9wf.dllGet hashmaliciousWannacryBrowse
                                            • 104.16.167.228
                                            hzQNazOx3Z.dllGet hashmaliciousWannacryBrowse
                                            • 104.16.167.228
                                            sEVVq8g1dJ.dllGet hashmaliciousWannacryBrowse
                                            • 104.16.166.228
                                            hsmSW6Eifl.dllGet hashmaliciousWannacryBrowse
                                            • 104.16.167.228
                                            87c6RORO31.dllGet hashmaliciousWannacryBrowse
                                            • 104.16.166.228
                                            Yx3rRuVx3c.dllGet hashmaliciousWannacryBrowse
                                            • 104.16.167.228
                                            5Q6ffmX9tQ.dllGet hashmaliciousWannacryBrowse
                                            • 104.16.166.228
                                            9nNO3SHiV1.dllGet hashmaliciousWannacryBrowse
                                            • 104.16.166.228
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            CSTNET-AS-APComputerNetworkInformationCenterCND3W41IdtQA.dllGet hashmaliciousWannacryBrowse
                                            • 202.122.32.233
                                            meth3.elfGet hashmaliciousMiraiBrowse
                                            • 42.198.118.207
                                            3.elfGet hashmaliciousUnknownBrowse
                                            • 223.208.187.249
                                            4.elfGet hashmaliciousUnknownBrowse
                                            • 118.196.163.136
                                            5.elfGet hashmaliciousUnknownBrowse
                                            • 42.198.118.201
                                            6.elfGet hashmaliciousUnknownBrowse
                                            • 42.198.166.138
                                            frosty.spc.elfGet hashmaliciousMiraiBrowse
                                            • 42.197.90.155
                                            5.elfGet hashmaliciousUnknownBrowse
                                            • 115.190.220.232
                                            5.elfGet hashmaliciousUnknownBrowse
                                            • 119.79.92.76
                                            5.elfGet hashmaliciousUnknownBrowse
                                            • 125.61.168.226
                                            DNIC-ASBLK-00306-00371USmeth3.elfGet hashmaliciousMiraiBrowse
                                            • 132.11.223.132
                                            arm4.elfGet hashmaliciousUnknownBrowse
                                            • 132.92.47.74
                                            arm5.elfGet hashmaliciousUnknownBrowse
                                            • 132.121.132.31
                                            meth9.elfGet hashmaliciousMiraiBrowse
                                            • 132.84.52.160
                                            elitebotnet.m68k.elfGet hashmaliciousMirai, OkiruBrowse
                                            • 132.130.51.243
                                            elitebotnet.x86.elfGet hashmaliciousMirai, OkiruBrowse
                                            • 132.94.165.79
                                            res.m68k.elfGet hashmaliciousUnknownBrowse
                                            • 132.121.57.36
                                            res.mpsl.elfGet hashmaliciousUnknownBrowse
                                            • 132.115.233.197
                                            res.arm5.elfGet hashmaliciousUnknownBrowse
                                            • 55.95.9.128
                                            res.x86.elfGet hashmaliciousUnknownBrowse
                                            • 132.119.18.243
                                            DNIC-AS-04010USm68k.elfGet hashmaliciousUnknownBrowse
                                            • 155.84.122.53
                                            armv5l.elfGet hashmaliciousUnknownBrowse
                                            • 155.88.157.92
                                            miori.arm5.elfGet hashmaliciousUnknownBrowse
                                            • 155.85.59.32
                                            miori.arm5.elfGet hashmaliciousUnknownBrowse
                                            • 155.77.222.196
                                            loligang.ppc.elfGet hashmaliciousMiraiBrowse
                                            • 155.90.30.194
                                            armv4l.elfGet hashmaliciousUnknownBrowse
                                            • 155.77.170.47
                                            nklarm5.elfGet hashmaliciousUnknownBrowse
                                            • 155.80.22.250
                                            splarm5.elfGet hashmaliciousUnknownBrowse
                                            • 155.83.95.66
                                            nabppc.elfGet hashmaliciousUnknownBrowse
                                            • 155.85.146.87
                                            nklm68k.elfGet hashmaliciousUnknownBrowse
                                            • 155.83.4.78
                                            No context
                                            No context
                                            Process:C:\Windows\mssecsvc.exe
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):3514368
                                            Entropy (8bit):6.651953394522253
                                            Encrypted:false
                                            SSDEEP:49152:nQqMSPbcBVQej/1INRx+TSqTg6SAARdhH9PAMEcaEau3:QqPoBhz1aRxcSUg6SAEdt9P593
                                            MD5:171E35FE5FD37CA850D3D1234D94E194
                                            SHA1:06C040762D84DE3A9EF76BC9E867598568CAC28A
                                            SHA-256:17528E634C992A0B607FA14C088983183282BFA90D470E1AE95BFF4763EFD866
                                            SHA-512:B50D220A39213EBC9F27BAF7D25FF6FEC06F608BDD5794DA8B600351B69B4C9C18CD2C151EDDE389B55FF3B95164247E63D763AA08B6B91EBC816DBD4858CF26
                                            Malicious:true
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 98%
                                            Reputation:low
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\mssecsvc.exe
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):3514368
                                            Entropy (8bit):6.651953394522253
                                            Encrypted:false
                                            SSDEEP:49152:nQqMSPbcBVQej/1INRx+TSqTg6SAARdhH9PAMEcaEau3:QqPoBhz1aRxcSUg6SAEdt9P593
                                            MD5:171E35FE5FD37CA850D3D1234D94E194
                                            SHA1:06C040762D84DE3A9EF76BC9E867598568CAC28A
                                            SHA-256:17528E634C992A0B607FA14C088983183282BFA90D470E1AE95BFF4763EFD866
                                            SHA-512:B50D220A39213EBC9F27BAF7D25FF6FEC06F608BDD5794DA8B600351B69B4C9C18CD2C151EDDE389B55FF3B95164247E63D763AA08B6B91EBC816DBD4858CF26
                                            Malicious:true
                                            Yara Hits:
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                            • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                            • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                                            Antivirus:
                                            • Antivirus: Avira, Detection: 100%
                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                            • Antivirus: ReversingLabs, Detection: 98%
                                            Reputation:low
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                                            File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Entropy (8bit):5.101469613004472
                                            TrID:
                                            • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                            • Generic Win/DOS Executable (2004/3) 0.20%
                                            • DOS Executable Generic (2002/1) 0.20%
                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                            File name:6fRzgDuqWT.dll
                                            File size:5'267'459 bytes
                                            MD5:99fbd88dafad2ed4a82cc80f8b8eb8d4
                                            SHA1:e2023fcc0a9991c84fa24ea4f3285305514c52cb
                                            SHA256:5b7edc95ab8033817fb07fee8e8f114be7f1873abcd69d07899ac60ae9b9763a
                                            SHA512:a012ac91f0475943cdfecf882e96e940cb445e7466d3a4e9d8737412b265b54d941a5a9798754e2942ef1c6b17deac56d351206f7cd8808560ccae30b554be8b
                                            SSDEEP:49152:JnAQqMSPbcBVQej/1INRx+TSqTg6SAARdhH9PAMEcaEau3:dDqPoBhz1aRxcSUg6SAEdt9P593
                                            TLSH:BF362359E69C99BCE18E2B3044738915EE773C6A62E9DB0FC72085683D037596FA0F12
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}.r_9...9...9.......=...9...6.....A.:.......8.......8.......:...Rich9...........................PE..L...QW.Y...........!.......
                                            Icon Hash:7ae282899bbab082
                                            Entrypoint:0x100011e9
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x10000000
                                            Subsystem:windows gui
                                            Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                                            DLL Characteristics:
                                            Time Stamp:0x59145751 [Thu May 11 12:21:37 2017 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:2e5708ae5fed0403e8117c645fb23e5b
                                            Instruction
                                            push ebp
                                            mov ebp, esp
                                            push ebx
                                            mov ebx, dword ptr [ebp+08h]
                                            push esi
                                            mov esi, dword ptr [ebp+0Ch]
                                            push edi
                                            mov edi, dword ptr [ebp+10h]
                                            test esi, esi
                                            jne 00007F08D0B2053Bh
                                            cmp dword ptr [10003140h], 00000000h
                                            jmp 00007F08D0B20558h
                                            cmp esi, 01h
                                            je 00007F08D0B20537h
                                            cmp esi, 02h
                                            jne 00007F08D0B20554h
                                            mov eax, dword ptr [10003150h]
                                            test eax, eax
                                            je 00007F08D0B2053Bh
                                            push edi
                                            push esi
                                            push ebx
                                            call eax
                                            test eax, eax
                                            je 00007F08D0B2053Eh
                                            push edi
                                            push esi
                                            push ebx
                                            call 00007F08D0B2044Ah
                                            test eax, eax
                                            jne 00007F08D0B20536h
                                            xor eax, eax
                                            jmp 00007F08D0B20580h
                                            push edi
                                            push esi
                                            push ebx
                                            call 00007F08D0B202FCh
                                            cmp esi, 01h
                                            mov dword ptr [ebp+0Ch], eax
                                            jne 00007F08D0B2053Eh
                                            test eax, eax
                                            jne 00007F08D0B20569h
                                            push edi
                                            push eax
                                            push ebx
                                            call 00007F08D0B20426h
                                            test esi, esi
                                            je 00007F08D0B20537h
                                            cmp esi, 03h
                                            jne 00007F08D0B20558h
                                            push edi
                                            push esi
                                            push ebx
                                            call 00007F08D0B20415h
                                            test eax, eax
                                            jne 00007F08D0B20535h
                                            and dword ptr [ebp+0Ch], eax
                                            cmp dword ptr [ebp+0Ch], 00000000h
                                            je 00007F08D0B20543h
                                            mov eax, dword ptr [10003150h]
                                            test eax, eax
                                            je 00007F08D0B2053Ah
                                            push edi
                                            push esi
                                            push ebx
                                            call eax
                                            mov dword ptr [ebp+0Ch], eax
                                            mov eax, dword ptr [ebp+0Ch]
                                            pop edi
                                            pop esi
                                            pop ebx
                                            pop ebp
                                            retn 000Ch
                                            jmp dword ptr [10002028h]
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            Programming Language:
                                            • [ C ] VS98 (6.0) build 8168
                                            • [C++] VS98 (6.0) build 8168
                                            • [RES] VS98 (6.0) cvtres build 1720
                                            • [LNK] VS98 (6.0) imp/exp build 8168
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x21900x48.rdata
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x203c0x3c.rdata
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x500060.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x5050000x5c.reloc
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x3c.rdata
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x10000x28c0x10008de9a2cb31e4c74bd008b871d14bfafcFalse0.13037109375data1.4429971244731552IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .rdata0x20000x1d80x10003dd394f95ab218593f2bc8eb65184db4False0.072509765625data0.7346018133622799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .data0x30000x1540x1000fe5022c5b5d015ad38b2b77fc437a5cbFalse0.016845703125Matlab v4 mat-file (little endian) C:\%s\%s, numeric, rows 0, columns 00.085238686413312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .rsrc0x40000x5000600x50100057f52bdde147d357bec573cf1d400de8unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .reloc0x5050000x2ac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                            W0x40600x500000dataEnglishUnited States0.8770942687988281
                                            DLLImport
                                            KERNEL32.dllCloseHandle, WriteFile, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, CreateProcessA
                                            MSVCRT.dllfree, _initterm, malloc, _adjust_fdiv, sprintf
                                            NameOrdinalAddress
                                            PlayGame10x10001114
                                            Language of compilation systemCountry where language is spokenMap
                                            EnglishUnited States
                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                            2025-01-15T02:52:18.401214+01002024291ET MALWARE Possible WannaCry DNS Lookup 11192.168.2.4621351.1.1.153UDP
                                            2025-01-15T02:52:18.961873+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.449730104.16.167.22880TCP
                                            2025-01-15T02:52:18.961873+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.449730104.16.167.22880TCP
                                            2025-01-15T02:52:18.961873+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.449730104.16.167.22880TCP
                                            2025-01-15T02:52:18.961873+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.449730104.16.167.22880TCP
                                            2025-01-15T02:52:18.961873+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.449730104.16.167.22880TCP
                                            2025-01-15T02:52:18.963211+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.449730TCP
                                            2025-01-15T02:52:19.652913+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.449731104.16.167.22880TCP
                                            2025-01-15T02:52:19.652913+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.449731104.16.167.22880TCP
                                            2025-01-15T02:52:19.652913+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.449731104.16.167.22880TCP
                                            2025-01-15T02:52:19.652913+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.449731104.16.167.22880TCP
                                            2025-01-15T02:52:19.652913+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.449731104.16.167.22880TCP
                                            2025-01-15T02:52:19.653640+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.449731TCP
                                            2025-01-15T02:52:21.841908+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.449754104.16.167.22880TCP
                                            2025-01-15T02:52:21.841908+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.449754104.16.167.22880TCP
                                            2025-01-15T02:52:21.841908+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.449754104.16.167.22880TCP
                                            2025-01-15T02:52:21.841908+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.449754104.16.167.22880TCP
                                            2025-01-15T02:52:21.841908+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.449754104.16.167.22880TCP
                                            2025-01-15T02:52:21.842988+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.449754TCP
                                            2025-01-15T02:54:25.857726+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.450642104.16.167.22880TCP
                                            2025-01-15T02:54:25.857726+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.450642104.16.167.22880TCP
                                            2025-01-15T02:54:25.857726+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.450642104.16.167.22880TCP
                                            2025-01-15T02:54:25.857726+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.450642104.16.167.22880TCP
                                            2025-01-15T02:54:25.857726+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.450642104.16.167.22880TCP
                                            2025-01-15T02:54:25.857856+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.450642TCP
                                            TimestampSource PortDest PortSource IPDest IP
                                            Jan 15, 2025 02:52:18.414438963 CET4973080192.168.2.4104.16.167.228
                                            Jan 15, 2025 02:52:18.419361115 CET8049730104.16.167.228192.168.2.4
                                            Jan 15, 2025 02:52:18.419471979 CET4973080192.168.2.4104.16.167.228
                                            Jan 15, 2025 02:52:18.419631004 CET4973080192.168.2.4104.16.167.228
                                            Jan 15, 2025 02:52:18.424473047 CET8049730104.16.167.228192.168.2.4
                                            Jan 15, 2025 02:52:18.961666107 CET8049730104.16.167.228192.168.2.4
                                            Jan 15, 2025 02:52:18.961873055 CET4973080192.168.2.4104.16.167.228
                                            Jan 15, 2025 02:52:18.962049007 CET4973080192.168.2.4104.16.167.228
                                            Jan 15, 2025 02:52:18.963211060 CET8049730104.16.167.228192.168.2.4
                                            Jan 15, 2025 02:52:18.965871096 CET4973080192.168.2.4104.16.167.228
                                            Jan 15, 2025 02:52:18.966834068 CET8049730104.16.167.228192.168.2.4
                                            Jan 15, 2025 02:52:19.178533077 CET4973180192.168.2.4104.16.167.228
                                            Jan 15, 2025 02:52:19.183406115 CET8049731104.16.167.228192.168.2.4
                                            Jan 15, 2025 02:52:19.183568001 CET4973180192.168.2.4104.16.167.228
                                            Jan 15, 2025 02:52:19.183681011 CET4973180192.168.2.4104.16.167.228
                                            Jan 15, 2025 02:52:19.188435078 CET8049731104.16.167.228192.168.2.4
                                            Jan 15, 2025 02:52:19.652614117 CET8049731104.16.167.228192.168.2.4
                                            Jan 15, 2025 02:52:19.652913094 CET4973180192.168.2.4104.16.167.228
                                            Jan 15, 2025 02:52:19.652913094 CET4973180192.168.2.4104.16.167.228
                                            Jan 15, 2025 02:52:19.653640032 CET8049731104.16.167.228192.168.2.4
                                            Jan 15, 2025 02:52:19.653753042 CET4973180192.168.2.4104.16.167.228
                                            Jan 15, 2025 02:52:19.657754898 CET8049731104.16.167.228192.168.2.4
                                            Jan 15, 2025 02:52:19.702444077 CET49732445192.168.2.436.159.231.192
                                            Jan 15, 2025 02:52:19.707427979 CET4454973236.159.231.192192.168.2.4
                                            Jan 15, 2025 02:52:19.707525015 CET49732445192.168.2.436.159.231.192
                                            Jan 15, 2025 02:52:19.708426952 CET49732445192.168.2.436.159.231.192
                                            Jan 15, 2025 02:52:19.708434105 CET49733445192.168.2.436.159.231.1
                                            Jan 15, 2025 02:52:19.713282108 CET4454973336.159.231.1192.168.2.4
                                            Jan 15, 2025 02:52:19.713316917 CET4454973236.159.231.192192.168.2.4
                                            Jan 15, 2025 02:52:19.713340044 CET49733445192.168.2.436.159.231.1
                                            Jan 15, 2025 02:52:19.713387012 CET49732445192.168.2.436.159.231.192
                                            Jan 15, 2025 02:52:19.713460922 CET49733445192.168.2.436.159.231.1
                                            Jan 15, 2025 02:52:19.718264103 CET4454973336.159.231.1192.168.2.4
                                            Jan 15, 2025 02:52:19.718338013 CET49733445192.168.2.436.159.231.1
                                            Jan 15, 2025 02:52:19.719578981 CET49735445192.168.2.436.159.231.1
                                            Jan 15, 2025 02:52:19.724443913 CET4454973536.159.231.1192.168.2.4
                                            Jan 15, 2025 02:52:19.724519014 CET49735445192.168.2.436.159.231.1
                                            Jan 15, 2025 02:52:19.724591017 CET49735445192.168.2.436.159.231.1
                                            Jan 15, 2025 02:52:19.729461908 CET4454973536.159.231.1192.168.2.4
                                            Jan 15, 2025 02:52:20.680959940 CET49675443192.168.2.4173.222.162.32
                                            Jan 15, 2025 02:52:21.343792915 CET4975480192.168.2.4104.16.167.228
                                            Jan 15, 2025 02:52:21.349865913 CET8049754104.16.167.228192.168.2.4
                                            Jan 15, 2025 02:52:21.349971056 CET4975480192.168.2.4104.16.167.228
                                            Jan 15, 2025 02:52:21.350320101 CET4975480192.168.2.4104.16.167.228
                                            Jan 15, 2025 02:52:21.355161905 CET8049754104.16.167.228192.168.2.4
                                            Jan 15, 2025 02:52:21.698736906 CET49758445192.168.2.4134.23.254.149
                                            Jan 15, 2025 02:52:21.703706026 CET44549758134.23.254.149192.168.2.4
                                            Jan 15, 2025 02:52:21.703845024 CET49758445192.168.2.4134.23.254.149
                                            Jan 15, 2025 02:52:21.703845024 CET49758445192.168.2.4134.23.254.149
                                            Jan 15, 2025 02:52:21.704152107 CET49759445192.168.2.4134.23.254.1
                                            Jan 15, 2025 02:52:21.708905935 CET44549758134.23.254.149192.168.2.4
                                            Jan 15, 2025 02:52:21.709012032 CET44549759134.23.254.1192.168.2.4
                                            Jan 15, 2025 02:52:21.709080935 CET49758445192.168.2.4134.23.254.149
                                            Jan 15, 2025 02:52:21.709095001 CET49759445192.168.2.4134.23.254.1
                                            Jan 15, 2025 02:52:21.709142923 CET49759445192.168.2.4134.23.254.1
                                            Jan 15, 2025 02:52:21.710876942 CET49760445192.168.2.4134.23.254.1
                                            Jan 15, 2025 02:52:21.714055061 CET44549759134.23.254.1192.168.2.4
                                            Jan 15, 2025 02:52:21.714128971 CET49759445192.168.2.4134.23.254.1
                                            Jan 15, 2025 02:52:21.715698957 CET44549760134.23.254.1192.168.2.4
                                            Jan 15, 2025 02:52:21.715768099 CET49760445192.168.2.4134.23.254.1
                                            Jan 15, 2025 02:52:21.715853930 CET49760445192.168.2.4134.23.254.1
                                            Jan 15, 2025 02:52:21.721111059 CET44549760134.23.254.1192.168.2.4
                                            Jan 15, 2025 02:52:21.841851950 CET8049754104.16.167.228192.168.2.4
                                            Jan 15, 2025 02:52:21.841907978 CET4975480192.168.2.4104.16.167.228
                                            Jan 15, 2025 02:52:21.842113972 CET4975480192.168.2.4104.16.167.228
                                            Jan 15, 2025 02:52:21.842988014 CET8049754104.16.167.228192.168.2.4
                                            Jan 15, 2025 02:52:21.843074083 CET4975480192.168.2.4104.16.167.228
                                            Jan 15, 2025 02:52:21.846918106 CET8049754104.16.167.228192.168.2.4
                                            Jan 15, 2025 02:52:23.714656115 CET49783445192.168.2.441.203.92.99
                                            Jan 15, 2025 02:52:23.720525026 CET4454978341.203.92.99192.168.2.4
                                            Jan 15, 2025 02:52:23.720668077 CET49783445192.168.2.441.203.92.99
                                            Jan 15, 2025 02:52:23.720668077 CET49783445192.168.2.441.203.92.99
                                            Jan 15, 2025 02:52:23.720918894 CET49784445192.168.2.441.203.92.1
                                            Jan 15, 2025 02:52:23.726831913 CET4454978341.203.92.99192.168.2.4
                                            Jan 15, 2025 02:52:23.726843119 CET4454978441.203.92.1192.168.2.4
                                            Jan 15, 2025 02:52:23.726901054 CET49783445192.168.2.441.203.92.99
                                            Jan 15, 2025 02:52:23.726948023 CET49784445192.168.2.441.203.92.1
                                            Jan 15, 2025 02:52:23.727034092 CET49784445192.168.2.441.203.92.1
                                            Jan 15, 2025 02:52:23.728970051 CET49785445192.168.2.441.203.92.1
                                            Jan 15, 2025 02:52:23.731867075 CET4454978441.203.92.1192.168.2.4
                                            Jan 15, 2025 02:52:23.731960058 CET49784445192.168.2.441.203.92.1
                                            Jan 15, 2025 02:52:23.733752012 CET4454978541.203.92.1192.168.2.4
                                            Jan 15, 2025 02:52:23.733819962 CET49785445192.168.2.441.203.92.1
                                            Jan 15, 2025 02:52:23.733884096 CET49785445192.168.2.441.203.92.1
                                            Jan 15, 2025 02:52:23.738866091 CET4454978541.203.92.1192.168.2.4
                                            Jan 15, 2025 02:52:25.732645988 CET49807445192.168.2.4166.216.208.196
                                            Jan 15, 2025 02:52:25.739166021 CET44549807166.216.208.196192.168.2.4
                                            Jan 15, 2025 02:52:25.739260912 CET49807445192.168.2.4166.216.208.196
                                            Jan 15, 2025 02:52:25.739340067 CET49807445192.168.2.4166.216.208.196
                                            Jan 15, 2025 02:52:25.739485979 CET49808445192.168.2.4166.216.208.1
                                            Jan 15, 2025 02:52:25.745274067 CET44549808166.216.208.1192.168.2.4
                                            Jan 15, 2025 02:52:25.745351076 CET49808445192.168.2.4166.216.208.1
                                            Jan 15, 2025 02:52:25.745419025 CET49808445192.168.2.4166.216.208.1
                                            Jan 15, 2025 02:52:25.745563030 CET44549807166.216.208.196192.168.2.4
                                            Jan 15, 2025 02:52:25.745620966 CET49807445192.168.2.4166.216.208.196
                                            Jan 15, 2025 02:52:25.746773005 CET49809445192.168.2.4166.216.208.1
                                            Jan 15, 2025 02:52:25.750350952 CET44549808166.216.208.1192.168.2.4
                                            Jan 15, 2025 02:52:25.750435114 CET49808445192.168.2.4166.216.208.1
                                            Jan 15, 2025 02:52:25.752116919 CET44549809166.216.208.1192.168.2.4
                                            Jan 15, 2025 02:52:25.752212048 CET49809445192.168.2.4166.216.208.1
                                            Jan 15, 2025 02:52:25.752289057 CET49809445192.168.2.4166.216.208.1
                                            Jan 15, 2025 02:52:25.758822918 CET44549809166.216.208.1192.168.2.4
                                            Jan 15, 2025 02:52:27.745698929 CET49828445192.168.2.4138.194.222.1
                                            Jan 15, 2025 02:52:27.750540018 CET44549828138.194.222.1192.168.2.4
                                            Jan 15, 2025 02:52:27.750724077 CET49828445192.168.2.4138.194.222.1
                                            Jan 15, 2025 02:52:27.750724077 CET49828445192.168.2.4138.194.222.1
                                            Jan 15, 2025 02:52:27.750884056 CET49829445192.168.2.4138.194.222.1
                                            Jan 15, 2025 02:52:27.755727053 CET44549829138.194.222.1192.168.2.4
                                            Jan 15, 2025 02:52:27.755811930 CET49829445192.168.2.4138.194.222.1
                                            Jan 15, 2025 02:52:27.755820990 CET44549828138.194.222.1192.168.2.4
                                            Jan 15, 2025 02:52:27.755877018 CET49828445192.168.2.4138.194.222.1
                                            Jan 15, 2025 02:52:27.755981922 CET49829445192.168.2.4138.194.222.1
                                            Jan 15, 2025 02:52:27.756994963 CET49830445192.168.2.4138.194.222.1
                                            Jan 15, 2025 02:52:27.760843992 CET44549829138.194.222.1192.168.2.4
                                            Jan 15, 2025 02:52:27.760904074 CET49829445192.168.2.4138.194.222.1
                                            Jan 15, 2025 02:52:27.761806011 CET44549830138.194.222.1192.168.2.4
                                            Jan 15, 2025 02:52:27.761888981 CET49830445192.168.2.4138.194.222.1
                                            Jan 15, 2025 02:52:27.762315035 CET49830445192.168.2.4138.194.222.1
                                            Jan 15, 2025 02:52:27.767123938 CET44549830138.194.222.1192.168.2.4
                                            Jan 15, 2025 02:52:29.789226055 CET49852445192.168.2.4215.244.84.27
                                            Jan 15, 2025 02:52:29.794208050 CET44549852215.244.84.27192.168.2.4
                                            Jan 15, 2025 02:52:29.794296026 CET49852445192.168.2.4215.244.84.27
                                            Jan 15, 2025 02:52:29.801877022 CET49852445192.168.2.4215.244.84.27
                                            Jan 15, 2025 02:52:29.802957058 CET49853445192.168.2.4215.244.84.1
                                            Jan 15, 2025 02:52:29.807060957 CET44549852215.244.84.27192.168.2.4
                                            Jan 15, 2025 02:52:29.807123899 CET49852445192.168.2.4215.244.84.27
                                            Jan 15, 2025 02:52:29.807780027 CET44549853215.244.84.1192.168.2.4
                                            Jan 15, 2025 02:52:29.807857990 CET49853445192.168.2.4215.244.84.1
                                            Jan 15, 2025 02:52:29.814938068 CET49853445192.168.2.4215.244.84.1
                                            Jan 15, 2025 02:52:29.820388079 CET44549853215.244.84.1192.168.2.4
                                            Jan 15, 2025 02:52:29.820586920 CET49853445192.168.2.4215.244.84.1
                                            Jan 15, 2025 02:52:29.923374891 CET49854445192.168.2.4215.244.84.1
                                            Jan 15, 2025 02:52:29.929301977 CET44549854215.244.84.1192.168.2.4
                                            Jan 15, 2025 02:52:29.929394007 CET49854445192.168.2.4215.244.84.1
                                            Jan 15, 2025 02:52:29.948038101 CET49854445192.168.2.4215.244.84.1
                                            Jan 15, 2025 02:52:29.955071926 CET44549854215.244.84.1192.168.2.4
                                            Jan 15, 2025 02:52:31.804384947 CET49876445192.168.2.4201.23.224.251
                                            Jan 15, 2025 02:52:31.809320927 CET44549876201.23.224.251192.168.2.4
                                            Jan 15, 2025 02:52:31.809426069 CET49876445192.168.2.4201.23.224.251
                                            Jan 15, 2025 02:52:31.809518099 CET49876445192.168.2.4201.23.224.251
                                            Jan 15, 2025 02:52:31.809592962 CET49877445192.168.2.4201.23.224.1
                                            Jan 15, 2025 02:52:31.814431906 CET44549877201.23.224.1192.168.2.4
                                            Jan 15, 2025 02:52:31.814496994 CET49877445192.168.2.4201.23.224.1
                                            Jan 15, 2025 02:52:31.814614058 CET49877445192.168.2.4201.23.224.1
                                            Jan 15, 2025 02:52:31.814698935 CET44549876201.23.224.251192.168.2.4
                                            Jan 15, 2025 02:52:31.814762115 CET49876445192.168.2.4201.23.224.251
                                            Jan 15, 2025 02:52:31.814932108 CET49879445192.168.2.4201.23.224.1
                                            Jan 15, 2025 02:52:31.819427967 CET44549877201.23.224.1192.168.2.4
                                            Jan 15, 2025 02:52:31.819473982 CET49877445192.168.2.4201.23.224.1
                                            Jan 15, 2025 02:52:31.819679976 CET44549879201.23.224.1192.168.2.4
                                            Jan 15, 2025 02:52:31.819730043 CET49879445192.168.2.4201.23.224.1
                                            Jan 15, 2025 02:52:31.819763899 CET49879445192.168.2.4201.23.224.1
                                            Jan 15, 2025 02:52:31.824537992 CET44549879201.23.224.1192.168.2.4
                                            Jan 15, 2025 02:52:33.807091951 CET49901445192.168.2.460.232.169.61
                                            Jan 15, 2025 02:52:33.811867952 CET4454990160.232.169.61192.168.2.4
                                            Jan 15, 2025 02:52:33.811948061 CET49901445192.168.2.460.232.169.61
                                            Jan 15, 2025 02:52:33.812114000 CET49901445192.168.2.460.232.169.61
                                            Jan 15, 2025 02:52:33.812243938 CET49902445192.168.2.460.232.169.1
                                            Jan 15, 2025 02:52:33.816883087 CET4454990160.232.169.61192.168.2.4
                                            Jan 15, 2025 02:52:33.816941023 CET49901445192.168.2.460.232.169.61
                                            Jan 15, 2025 02:52:33.816989899 CET4454990260.232.169.1192.168.2.4
                                            Jan 15, 2025 02:52:33.817075014 CET49902445192.168.2.460.232.169.1
                                            Jan 15, 2025 02:52:33.817100048 CET49902445192.168.2.460.232.169.1
                                            Jan 15, 2025 02:52:33.817354918 CET49903445192.168.2.460.232.169.1
                                            Jan 15, 2025 02:52:33.822017908 CET4454990260.232.169.1192.168.2.4
                                            Jan 15, 2025 02:52:33.822099924 CET4454990360.232.169.1192.168.2.4
                                            Jan 15, 2025 02:52:33.822160006 CET49902445192.168.2.460.232.169.1
                                            Jan 15, 2025 02:52:33.822215080 CET49903445192.168.2.460.232.169.1
                                            Jan 15, 2025 02:52:33.822252035 CET49903445192.168.2.460.232.169.1
                                            Jan 15, 2025 02:52:33.826986074 CET4454990360.232.169.1192.168.2.4
                                            Jan 15, 2025 02:52:34.308516026 CET4972380192.168.2.4199.232.214.172
                                            Jan 15, 2025 02:52:34.313474894 CET8049723199.232.214.172192.168.2.4
                                            Jan 15, 2025 02:52:34.313632011 CET4972380192.168.2.4199.232.214.172
                                            Jan 15, 2025 02:52:35.822058916 CET49927445192.168.2.4168.221.244.71
                                            Jan 15, 2025 02:52:35.826855898 CET44549927168.221.244.71192.168.2.4
                                            Jan 15, 2025 02:52:35.826930046 CET49927445192.168.2.4168.221.244.71
                                            Jan 15, 2025 02:52:35.826953888 CET49927445192.168.2.4168.221.244.71
                                            Jan 15, 2025 02:52:35.827131987 CET49928445192.168.2.4168.221.244.1
                                            Jan 15, 2025 02:52:35.831981897 CET44549927168.221.244.71192.168.2.4
                                            Jan 15, 2025 02:52:35.832031965 CET49927445192.168.2.4168.221.244.71
                                            Jan 15, 2025 02:52:35.832185030 CET44549928168.221.244.1192.168.2.4
                                            Jan 15, 2025 02:52:35.832267046 CET49928445192.168.2.4168.221.244.1
                                            Jan 15, 2025 02:52:35.832314968 CET49928445192.168.2.4168.221.244.1
                                            Jan 15, 2025 02:52:35.832537889 CET49929445192.168.2.4168.221.244.1
                                            Jan 15, 2025 02:52:35.837182999 CET44549928168.221.244.1192.168.2.4
                                            Jan 15, 2025 02:52:35.837279081 CET49928445192.168.2.4168.221.244.1
                                            Jan 15, 2025 02:52:35.837418079 CET44549929168.221.244.1192.168.2.4
                                            Jan 15, 2025 02:52:35.837474108 CET49929445192.168.2.4168.221.244.1
                                            Jan 15, 2025 02:52:35.837634087 CET49929445192.168.2.4168.221.244.1
                                            Jan 15, 2025 02:52:35.842376947 CET44549929168.221.244.1192.168.2.4
                                            Jan 15, 2025 02:52:38.249778986 CET49951445192.168.2.4107.95.115.109
                                            Jan 15, 2025 02:52:38.254651070 CET44549951107.95.115.109192.168.2.4
                                            Jan 15, 2025 02:52:38.254713058 CET49951445192.168.2.4107.95.115.109
                                            Jan 15, 2025 02:52:38.254786015 CET49951445192.168.2.4107.95.115.109
                                            Jan 15, 2025 02:52:38.254904032 CET49952445192.168.2.4107.95.115.1
                                            Jan 15, 2025 02:52:38.259625912 CET44549951107.95.115.109192.168.2.4
                                            Jan 15, 2025 02:52:38.259664059 CET49951445192.168.2.4107.95.115.109
                                            Jan 15, 2025 02:52:38.259691000 CET44549952107.95.115.1192.168.2.4
                                            Jan 15, 2025 02:52:38.259742022 CET49952445192.168.2.4107.95.115.1
                                            Jan 15, 2025 02:52:38.259763956 CET49952445192.168.2.4107.95.115.1
                                            Jan 15, 2025 02:52:38.261831999 CET49953445192.168.2.4107.95.115.1
                                            Jan 15, 2025 02:52:38.262211084 CET4972480192.168.2.4199.232.214.172
                                            Jan 15, 2025 02:52:38.264626026 CET44549952107.95.115.1192.168.2.4
                                            Jan 15, 2025 02:52:38.264925957 CET49952445192.168.2.4107.95.115.1
                                            Jan 15, 2025 02:52:38.266618967 CET44549953107.95.115.1192.168.2.4
                                            Jan 15, 2025 02:52:38.266670942 CET49953445192.168.2.4107.95.115.1
                                            Jan 15, 2025 02:52:38.266693115 CET49953445192.168.2.4107.95.115.1
                                            Jan 15, 2025 02:52:38.267184019 CET8049724199.232.214.172192.168.2.4
                                            Jan 15, 2025 02:52:38.267235041 CET4972480192.168.2.4199.232.214.172
                                            Jan 15, 2025 02:52:38.271469116 CET44549953107.95.115.1192.168.2.4
                                            Jan 15, 2025 02:52:40.243931055 CET49974445192.168.2.4184.52.7.196
                                            Jan 15, 2025 02:52:40.248809099 CET44549974184.52.7.196192.168.2.4
                                            Jan 15, 2025 02:52:40.248897076 CET49974445192.168.2.4184.52.7.196
                                            Jan 15, 2025 02:52:40.249002934 CET49974445192.168.2.4184.52.7.196
                                            Jan 15, 2025 02:52:40.249073029 CET49975445192.168.2.4184.52.7.1
                                            Jan 15, 2025 02:52:40.253846884 CET44549975184.52.7.1192.168.2.4
                                            Jan 15, 2025 02:52:40.253874063 CET44549974184.52.7.196192.168.2.4
                                            Jan 15, 2025 02:52:40.253922939 CET49975445192.168.2.4184.52.7.1
                                            Jan 15, 2025 02:52:40.253974915 CET49974445192.168.2.4184.52.7.196
                                            Jan 15, 2025 02:52:40.253974915 CET49975445192.168.2.4184.52.7.1
                                            Jan 15, 2025 02:52:40.254153013 CET49976445192.168.2.4184.52.7.1
                                            Jan 15, 2025 02:52:40.258843899 CET44549975184.52.7.1192.168.2.4
                                            Jan 15, 2025 02:52:40.258907080 CET49975445192.168.2.4184.52.7.1
                                            Jan 15, 2025 02:52:40.259012938 CET44549976184.52.7.1192.168.2.4
                                            Jan 15, 2025 02:52:40.259083986 CET49976445192.168.2.4184.52.7.1
                                            Jan 15, 2025 02:52:40.259102106 CET49976445192.168.2.4184.52.7.1
                                            Jan 15, 2025 02:52:40.263915062 CET44549976184.52.7.1192.168.2.4
                                            Jan 15, 2025 02:52:41.091015100 CET4454973536.159.231.1192.168.2.4
                                            Jan 15, 2025 02:52:41.091114044 CET49735445192.168.2.436.159.231.1
                                            Jan 15, 2025 02:52:41.091160059 CET49735445192.168.2.436.159.231.1
                                            Jan 15, 2025 02:52:41.091227055 CET49735445192.168.2.436.159.231.1
                                            Jan 15, 2025 02:52:41.095920086 CET4454973536.159.231.1192.168.2.4
                                            Jan 15, 2025 02:52:41.095942020 CET4454973536.159.231.1192.168.2.4
                                            Jan 15, 2025 02:52:42.259821892 CET49999445192.168.2.4119.78.29.114
                                            Jan 15, 2025 02:52:42.264647007 CET44549999119.78.29.114192.168.2.4
                                            Jan 15, 2025 02:52:42.264750957 CET49999445192.168.2.4119.78.29.114
                                            Jan 15, 2025 02:52:42.264790058 CET49999445192.168.2.4119.78.29.114
                                            Jan 15, 2025 02:52:42.264894962 CET50000445192.168.2.4119.78.29.1
                                            Jan 15, 2025 02:52:42.269679070 CET44550000119.78.29.1192.168.2.4
                                            Jan 15, 2025 02:52:42.269753933 CET50000445192.168.2.4119.78.29.1
                                            Jan 15, 2025 02:52:42.269759893 CET44549999119.78.29.114192.168.2.4
                                            Jan 15, 2025 02:52:42.269793034 CET50000445192.168.2.4119.78.29.1
                                            Jan 15, 2025 02:52:42.269809008 CET49999445192.168.2.4119.78.29.114
                                            Jan 15, 2025 02:52:42.270127058 CET50001445192.168.2.4119.78.29.1
                                            Jan 15, 2025 02:52:42.274719000 CET44550000119.78.29.1192.168.2.4
                                            Jan 15, 2025 02:52:42.274920940 CET50000445192.168.2.4119.78.29.1
                                            Jan 15, 2025 02:52:42.274977922 CET44550001119.78.29.1192.168.2.4
                                            Jan 15, 2025 02:52:42.275072098 CET50001445192.168.2.4119.78.29.1
                                            Jan 15, 2025 02:52:42.279874086 CET44550001119.78.29.1192.168.2.4
                                            Jan 15, 2025 02:52:43.074660063 CET44549760134.23.254.1192.168.2.4
                                            Jan 15, 2025 02:52:43.074718952 CET49760445192.168.2.4134.23.254.1
                                            Jan 15, 2025 02:52:43.074913979 CET49760445192.168.2.4134.23.254.1
                                            Jan 15, 2025 02:52:43.074969053 CET49760445192.168.2.4134.23.254.1
                                            Jan 15, 2025 02:52:43.079670906 CET44549760134.23.254.1192.168.2.4
                                            Jan 15, 2025 02:52:43.079765081 CET44549760134.23.254.1192.168.2.4
                                            Jan 15, 2025 02:52:44.103606939 CET50022445192.168.2.436.159.231.1
                                            Jan 15, 2025 02:52:44.275453091 CET50025445192.168.2.4212.221.152.195
                                            Jan 15, 2025 02:52:44.288964987 CET4455002236.159.231.1192.168.2.4
                                            Jan 15, 2025 02:52:44.289053917 CET50022445192.168.2.436.159.231.1
                                            Jan 15, 2025 02:52:44.289124012 CET50022445192.168.2.436.159.231.1
                                            Jan 15, 2025 02:52:44.290537119 CET44550025212.221.152.195192.168.2.4
                                            Jan 15, 2025 02:52:44.290611982 CET50025445192.168.2.4212.221.152.195
                                            Jan 15, 2025 02:52:44.290643930 CET50025445192.168.2.4212.221.152.195
                                            Jan 15, 2025 02:52:44.290838957 CET50026445192.168.2.4212.221.152.1
                                            Jan 15, 2025 02:52:44.293862104 CET4455002236.159.231.1192.168.2.4
                                            Jan 15, 2025 02:52:44.295797110 CET44550026212.221.152.1192.168.2.4
                                            Jan 15, 2025 02:52:44.295887947 CET50026445192.168.2.4212.221.152.1
                                            Jan 15, 2025 02:52:44.296000004 CET50026445192.168.2.4212.221.152.1
                                            Jan 15, 2025 02:52:44.296140909 CET50027445192.168.2.4212.221.152.1
                                            Jan 15, 2025 02:52:44.296179056 CET44550025212.221.152.195192.168.2.4
                                            Jan 15, 2025 02:52:44.296226978 CET50025445192.168.2.4212.221.152.195
                                            Jan 15, 2025 02:52:44.300842047 CET44550026212.221.152.1192.168.2.4
                                            Jan 15, 2025 02:52:44.300946951 CET44550027212.221.152.1192.168.2.4
                                            Jan 15, 2025 02:52:44.301019907 CET50027445192.168.2.4212.221.152.1
                                            Jan 15, 2025 02:52:44.301059008 CET50027445192.168.2.4212.221.152.1
                                            Jan 15, 2025 02:52:44.301081896 CET50026445192.168.2.4212.221.152.1
                                            Jan 15, 2025 02:52:44.305851936 CET44550027212.221.152.1192.168.2.4
                                            Jan 15, 2025 02:52:45.110007048 CET4454978541.203.92.1192.168.2.4
                                            Jan 15, 2025 02:52:45.110121012 CET49785445192.168.2.441.203.92.1
                                            Jan 15, 2025 02:52:45.110169888 CET49785445192.168.2.441.203.92.1
                                            Jan 15, 2025 02:52:45.110239983 CET49785445192.168.2.441.203.92.1
                                            Jan 15, 2025 02:52:45.114986897 CET4454978541.203.92.1192.168.2.4
                                            Jan 15, 2025 02:52:45.115040064 CET4454978541.203.92.1192.168.2.4
                                            Jan 15, 2025 02:52:45.929244995 CET44550027212.221.152.1192.168.2.4
                                            Jan 15, 2025 02:52:45.929395914 CET50027445192.168.2.4212.221.152.1
                                            Jan 15, 2025 02:52:45.929418087 CET50027445192.168.2.4212.221.152.1
                                            Jan 15, 2025 02:52:45.929447889 CET50027445192.168.2.4212.221.152.1
                                            Jan 15, 2025 02:52:45.934238911 CET44550027212.221.152.1192.168.2.4
                                            Jan 15, 2025 02:52:45.934252024 CET44550027212.221.152.1192.168.2.4
                                            Jan 15, 2025 02:52:46.087575912 CET50037445192.168.2.4134.23.254.1
                                            Jan 15, 2025 02:52:46.092464924 CET44550037134.23.254.1192.168.2.4
                                            Jan 15, 2025 02:52:46.092576981 CET50037445192.168.2.4134.23.254.1
                                            Jan 15, 2025 02:52:46.092621088 CET50037445192.168.2.4134.23.254.1
                                            Jan 15, 2025 02:52:46.097438097 CET44550037134.23.254.1192.168.2.4
                                            Jan 15, 2025 02:52:46.290940046 CET50038445192.168.2.4198.7.103.246
                                            Jan 15, 2025 02:52:46.295747042 CET44550038198.7.103.246192.168.2.4
                                            Jan 15, 2025 02:52:46.295850039 CET50038445192.168.2.4198.7.103.246
                                            Jan 15, 2025 02:52:46.295960903 CET50038445192.168.2.4198.7.103.246
                                            Jan 15, 2025 02:52:46.296135902 CET50039445192.168.2.4198.7.103.1
                                            Jan 15, 2025 02:52:46.300997972 CET44550039198.7.103.1192.168.2.4
                                            Jan 15, 2025 02:52:46.301018000 CET44550038198.7.103.246192.168.2.4
                                            Jan 15, 2025 02:52:46.301152945 CET50038445192.168.2.4198.7.103.246
                                            Jan 15, 2025 02:52:46.301156044 CET50039445192.168.2.4198.7.103.1
                                            Jan 15, 2025 02:52:46.301156044 CET50039445192.168.2.4198.7.103.1
                                            Jan 15, 2025 02:52:46.301395893 CET50040445192.168.2.4198.7.103.1
                                            Jan 15, 2025 02:52:46.306255102 CET44550040198.7.103.1192.168.2.4
                                            Jan 15, 2025 02:52:46.306324959 CET44550039198.7.103.1192.168.2.4
                                            Jan 15, 2025 02:52:46.306356907 CET50040445192.168.2.4198.7.103.1
                                            Jan 15, 2025 02:52:46.306370020 CET50040445192.168.2.4198.7.103.1
                                            Jan 15, 2025 02:52:46.308058023 CET50039445192.168.2.4198.7.103.1
                                            Jan 15, 2025 02:52:46.311228991 CET44550040198.7.103.1192.168.2.4
                                            Jan 15, 2025 02:52:47.106861115 CET44549809166.216.208.1192.168.2.4
                                            Jan 15, 2025 02:52:47.106977940 CET49809445192.168.2.4166.216.208.1
                                            Jan 15, 2025 02:52:47.107038975 CET49809445192.168.2.4166.216.208.1
                                            Jan 15, 2025 02:52:47.107125044 CET49809445192.168.2.4166.216.208.1
                                            Jan 15, 2025 02:52:47.112689972 CET44549809166.216.208.1192.168.2.4
                                            Jan 15, 2025 02:52:47.112706900 CET44549809166.216.208.1192.168.2.4
                                            Jan 15, 2025 02:52:48.118998051 CET50041445192.168.2.441.203.92.1
                                            Jan 15, 2025 02:52:48.126425028 CET4455004141.203.92.1192.168.2.4
                                            Jan 15, 2025 02:52:48.126550913 CET50041445192.168.2.441.203.92.1
                                            Jan 15, 2025 02:52:48.126550913 CET50041445192.168.2.441.203.92.1
                                            Jan 15, 2025 02:52:48.132002115 CET4455004141.203.92.1192.168.2.4
                                            Jan 15, 2025 02:52:48.306504011 CET50042445192.168.2.443.143.201.230
                                            Jan 15, 2025 02:52:48.313983917 CET4455004243.143.201.230192.168.2.4
                                            Jan 15, 2025 02:52:48.314064980 CET50042445192.168.2.443.143.201.230
                                            Jan 15, 2025 02:52:48.314124107 CET50042445192.168.2.443.143.201.230
                                            Jan 15, 2025 02:52:48.314357042 CET50043445192.168.2.443.143.201.1
                                            Jan 15, 2025 02:52:48.320363045 CET4455004243.143.201.230192.168.2.4
                                            Jan 15, 2025 02:52:48.320524931 CET50042445192.168.2.443.143.201.230
                                            Jan 15, 2025 02:52:48.320615053 CET4455004343.143.201.1192.168.2.4
                                            Jan 15, 2025 02:52:48.320693970 CET50043445192.168.2.443.143.201.1
                                            Jan 15, 2025 02:52:48.320693970 CET50043445192.168.2.443.143.201.1
                                            Jan 15, 2025 02:52:48.320971012 CET50044445192.168.2.443.143.201.1
                                            Jan 15, 2025 02:52:48.326607943 CET4455004343.143.201.1192.168.2.4
                                            Jan 15, 2025 02:52:48.326668978 CET50043445192.168.2.443.143.201.1
                                            Jan 15, 2025 02:52:48.326736927 CET4455004443.143.201.1192.168.2.4
                                            Jan 15, 2025 02:52:48.326791048 CET50044445192.168.2.443.143.201.1
                                            Jan 15, 2025 02:52:48.326826096 CET50044445192.168.2.443.143.201.1
                                            Jan 15, 2025 02:52:48.333507061 CET4455004443.143.201.1192.168.2.4
                                            Jan 15, 2025 02:52:48.931160927 CET50045445192.168.2.4212.221.152.1
                                            Jan 15, 2025 02:52:48.938559055 CET44550045212.221.152.1192.168.2.4
                                            Jan 15, 2025 02:52:48.938627958 CET50045445192.168.2.4212.221.152.1
                                            Jan 15, 2025 02:52:48.938667059 CET50045445192.168.2.4212.221.152.1
                                            Jan 15, 2025 02:52:48.946312904 CET44550045212.221.152.1192.168.2.4
                                            Jan 15, 2025 02:52:49.106106043 CET44549830138.194.222.1192.168.2.4
                                            Jan 15, 2025 02:52:49.106406927 CET49830445192.168.2.4138.194.222.1
                                            Jan 15, 2025 02:52:49.106406927 CET49830445192.168.2.4138.194.222.1
                                            Jan 15, 2025 02:52:49.106862068 CET49830445192.168.2.4138.194.222.1
                                            Jan 15, 2025 02:52:49.111267090 CET44549830138.194.222.1192.168.2.4
                                            Jan 15, 2025 02:52:49.111737967 CET44549830138.194.222.1192.168.2.4
                                            Jan 15, 2025 02:52:50.118720055 CET50046445192.168.2.4166.216.208.1
                                            Jan 15, 2025 02:52:50.123454094 CET44550046166.216.208.1192.168.2.4
                                            Jan 15, 2025 02:52:50.123526096 CET50046445192.168.2.4166.216.208.1
                                            Jan 15, 2025 02:52:50.123569012 CET50046445192.168.2.4166.216.208.1
                                            Jan 15, 2025 02:52:50.128293037 CET44550046166.216.208.1192.168.2.4
                                            Jan 15, 2025 02:52:50.322164059 CET50047445192.168.2.4181.107.70.74
                                            Jan 15, 2025 02:52:50.327054977 CET44550047181.107.70.74192.168.2.4
                                            Jan 15, 2025 02:52:50.327136040 CET50047445192.168.2.4181.107.70.74
                                            Jan 15, 2025 02:52:50.327167988 CET50047445192.168.2.4181.107.70.74
                                            Jan 15, 2025 02:52:50.327389956 CET50048445192.168.2.4181.107.70.1
                                            Jan 15, 2025 02:52:50.332165003 CET44550047181.107.70.74192.168.2.4
                                            Jan 15, 2025 02:52:50.332201004 CET44550048181.107.70.1192.168.2.4
                                            Jan 15, 2025 02:52:50.332238913 CET50047445192.168.2.4181.107.70.74
                                            Jan 15, 2025 02:52:50.332273960 CET50048445192.168.2.4181.107.70.1
                                            Jan 15, 2025 02:52:50.332345963 CET50048445192.168.2.4181.107.70.1
                                            Jan 15, 2025 02:52:50.332540989 CET50049445192.168.2.4181.107.70.1
                                            Jan 15, 2025 02:52:50.337276936 CET44550048181.107.70.1192.168.2.4
                                            Jan 15, 2025 02:52:50.337323904 CET50048445192.168.2.4181.107.70.1
                                            Jan 15, 2025 02:52:50.337399960 CET44550049181.107.70.1192.168.2.4
                                            Jan 15, 2025 02:52:50.337483883 CET50049445192.168.2.4181.107.70.1
                                            Jan 15, 2025 02:52:50.337483883 CET50049445192.168.2.4181.107.70.1
                                            Jan 15, 2025 02:52:50.342318058 CET44550049181.107.70.1192.168.2.4
                                            Jan 15, 2025 02:52:50.542632103 CET44550045212.221.152.1192.168.2.4
                                            Jan 15, 2025 02:52:50.542715073 CET50045445192.168.2.4212.221.152.1
                                            Jan 15, 2025 02:52:50.542757988 CET50045445192.168.2.4212.221.152.1
                                            Jan 15, 2025 02:52:50.542789936 CET50045445192.168.2.4212.221.152.1
                                            Jan 15, 2025 02:52:50.547516108 CET44550045212.221.152.1192.168.2.4
                                            Jan 15, 2025 02:52:50.547524929 CET44550045212.221.152.1192.168.2.4
                                            Jan 15, 2025 02:52:50.603342056 CET50050445192.168.2.4212.221.152.2
                                            Jan 15, 2025 02:52:50.608309031 CET44550050212.221.152.2192.168.2.4
                                            Jan 15, 2025 02:52:50.608439922 CET50050445192.168.2.4212.221.152.2
                                            Jan 15, 2025 02:52:50.608439922 CET50050445192.168.2.4212.221.152.2
                                            Jan 15, 2025 02:52:50.608747959 CET50051445192.168.2.4212.221.152.2
                                            Jan 15, 2025 02:52:50.613428116 CET44550050212.221.152.2192.168.2.4
                                            Jan 15, 2025 02:52:50.613513947 CET44550051212.221.152.2192.168.2.4
                                            Jan 15, 2025 02:52:50.613538027 CET50050445192.168.2.4212.221.152.2
                                            Jan 15, 2025 02:52:50.613595963 CET50051445192.168.2.4212.221.152.2
                                            Jan 15, 2025 02:52:50.613642931 CET50051445192.168.2.4212.221.152.2
                                            Jan 15, 2025 02:52:50.618483067 CET44550051212.221.152.2192.168.2.4
                                            Jan 15, 2025 02:52:51.295504093 CET44549854215.244.84.1192.168.2.4
                                            Jan 15, 2025 02:52:51.295605898 CET49854445192.168.2.4215.244.84.1
                                            Jan 15, 2025 02:52:51.295650959 CET49854445192.168.2.4215.244.84.1
                                            Jan 15, 2025 02:52:51.295722008 CET49854445192.168.2.4215.244.84.1
                                            Jan 15, 2025 02:52:51.300610065 CET44549854215.244.84.1192.168.2.4
                                            Jan 15, 2025 02:52:51.300668001 CET44549854215.244.84.1192.168.2.4
                                            Jan 15, 2025 02:52:52.119184017 CET50052445192.168.2.4138.194.222.1
                                            Jan 15, 2025 02:52:52.124012947 CET44550052138.194.222.1192.168.2.4
                                            Jan 15, 2025 02:52:52.124077082 CET50052445192.168.2.4138.194.222.1
                                            Jan 15, 2025 02:52:52.124138117 CET50052445192.168.2.4138.194.222.1
                                            Jan 15, 2025 02:52:52.129054070 CET44550052138.194.222.1192.168.2.4
                                            Jan 15, 2025 02:52:52.194576025 CET44550051212.221.152.2192.168.2.4
                                            Jan 15, 2025 02:52:52.194654942 CET50051445192.168.2.4212.221.152.2
                                            Jan 15, 2025 02:52:52.194701910 CET50051445192.168.2.4212.221.152.2
                                            Jan 15, 2025 02:52:52.194747925 CET50051445192.168.2.4212.221.152.2
                                            Jan 15, 2025 02:52:52.199527979 CET44550051212.221.152.2192.168.2.4
                                            Jan 15, 2025 02:52:52.199537992 CET44550051212.221.152.2192.168.2.4
                                            Jan 15, 2025 02:52:52.337995052 CET50053445192.168.2.4203.110.14.27
                                            Jan 15, 2025 02:52:52.342849970 CET44550053203.110.14.27192.168.2.4
                                            Jan 15, 2025 02:52:52.342937946 CET50053445192.168.2.4203.110.14.27
                                            Jan 15, 2025 02:52:52.342957973 CET50053445192.168.2.4203.110.14.27
                                            Jan 15, 2025 02:52:52.343038082 CET50054445192.168.2.4203.110.14.1
                                            Jan 15, 2025 02:52:52.347821951 CET44550054203.110.14.1192.168.2.4
                                            Jan 15, 2025 02:52:52.347882032 CET50054445192.168.2.4203.110.14.1
                                            Jan 15, 2025 02:52:52.347898006 CET50054445192.168.2.4203.110.14.1
                                            Jan 15, 2025 02:52:52.347959042 CET44550053203.110.14.27192.168.2.4
                                            Jan 15, 2025 02:52:52.348009109 CET50053445192.168.2.4203.110.14.27
                                            Jan 15, 2025 02:52:52.348225117 CET50055445192.168.2.4203.110.14.1
                                            Jan 15, 2025 02:52:52.352861881 CET44550054203.110.14.1192.168.2.4
                                            Jan 15, 2025 02:52:52.352936029 CET50054445192.168.2.4203.110.14.1
                                            Jan 15, 2025 02:52:52.352976084 CET44550055203.110.14.1192.168.2.4
                                            Jan 15, 2025 02:52:52.353029966 CET50055445192.168.2.4203.110.14.1
                                            Jan 15, 2025 02:52:52.353106976 CET50055445192.168.2.4203.110.14.1
                                            Jan 15, 2025 02:52:52.357894897 CET44550055203.110.14.1192.168.2.4
                                            Jan 15, 2025 02:52:53.188196898 CET44549879201.23.224.1192.168.2.4
                                            Jan 15, 2025 02:52:53.188405991 CET49879445192.168.2.4201.23.224.1
                                            Jan 15, 2025 02:52:53.188560009 CET49879445192.168.2.4201.23.224.1
                                            Jan 15, 2025 02:52:53.188560009 CET49879445192.168.2.4201.23.224.1
                                            Jan 15, 2025 02:52:53.193291903 CET44549879201.23.224.1192.168.2.4
                                            Jan 15, 2025 02:52:53.193341970 CET44549879201.23.224.1192.168.2.4
                                            Jan 15, 2025 02:52:54.306438923 CET50056445192.168.2.4215.244.84.1
                                            Jan 15, 2025 02:52:54.312167883 CET44550056215.244.84.1192.168.2.4
                                            Jan 15, 2025 02:52:54.312367916 CET50056445192.168.2.4215.244.84.1
                                            Jan 15, 2025 02:52:54.312367916 CET50056445192.168.2.4215.244.84.1
                                            Jan 15, 2025 02:52:54.318279028 CET44550056215.244.84.1192.168.2.4
                                            Jan 15, 2025 02:52:54.353354931 CET50057445192.168.2.4193.32.83.8
                                            Jan 15, 2025 02:52:54.358247995 CET44550057193.32.83.8192.168.2.4
                                            Jan 15, 2025 02:52:54.358320951 CET50057445192.168.2.4193.32.83.8
                                            Jan 15, 2025 02:52:54.358357906 CET50057445192.168.2.4193.32.83.8
                                            Jan 15, 2025 02:52:54.358541965 CET50058445192.168.2.4193.32.83.1
                                            Jan 15, 2025 02:52:54.363430977 CET44550058193.32.83.1192.168.2.4
                                            Jan 15, 2025 02:52:54.363492966 CET50058445192.168.2.4193.32.83.1
                                            Jan 15, 2025 02:52:54.363514900 CET50058445192.168.2.4193.32.83.1
                                            Jan 15, 2025 02:52:54.363746881 CET50059445192.168.2.4193.32.83.1
                                            Jan 15, 2025 02:52:54.363986969 CET44550057193.32.83.8192.168.2.4
                                            Jan 15, 2025 02:52:54.364044905 CET50057445192.168.2.4193.32.83.8
                                            Jan 15, 2025 02:52:54.368469954 CET44550058193.32.83.1192.168.2.4
                                            Jan 15, 2025 02:52:54.368524075 CET50058445192.168.2.4193.32.83.1
                                            Jan 15, 2025 02:52:54.368609905 CET44550059193.32.83.1192.168.2.4
                                            Jan 15, 2025 02:52:54.368678093 CET50059445192.168.2.4193.32.83.1
                                            Jan 15, 2025 02:52:54.368690968 CET50059445192.168.2.4193.32.83.1
                                            Jan 15, 2025 02:52:54.373516083 CET44550059193.32.83.1192.168.2.4
                                            Jan 15, 2025 02:52:55.196939945 CET50060445192.168.2.4212.221.152.2
                                            Jan 15, 2025 02:52:55.201952934 CET44550060212.221.152.2192.168.2.4
                                            Jan 15, 2025 02:52:55.202039957 CET50060445192.168.2.4212.221.152.2
                                            Jan 15, 2025 02:52:55.202069998 CET50060445192.168.2.4212.221.152.2
                                            Jan 15, 2025 02:52:55.203798056 CET4454990360.232.169.1192.168.2.4
                                            Jan 15, 2025 02:52:55.203864098 CET49903445192.168.2.460.232.169.1
                                            Jan 15, 2025 02:52:55.203903913 CET49903445192.168.2.460.232.169.1
                                            Jan 15, 2025 02:52:55.203927040 CET49903445192.168.2.460.232.169.1
                                            Jan 15, 2025 02:52:55.207020044 CET44550060212.221.152.2192.168.2.4
                                            Jan 15, 2025 02:52:55.208857059 CET4454990360.232.169.1192.168.2.4
                                            Jan 15, 2025 02:52:55.208888054 CET4454990360.232.169.1192.168.2.4
                                            Jan 15, 2025 02:52:56.196916103 CET50061445192.168.2.4201.23.224.1
                                            Jan 15, 2025 02:52:56.201911926 CET44550061201.23.224.1192.168.2.4
                                            Jan 15, 2025 02:52:56.202049017 CET50061445192.168.2.4201.23.224.1
                                            Jan 15, 2025 02:52:56.202089071 CET50061445192.168.2.4201.23.224.1
                                            Jan 15, 2025 02:52:56.206907034 CET44550061201.23.224.1192.168.2.4
                                            Jan 15, 2025 02:52:56.228315115 CET50062445192.168.2.426.174.0.83
                                            Jan 15, 2025 02:52:56.233150959 CET4455006226.174.0.83192.168.2.4
                                            Jan 15, 2025 02:52:56.233253002 CET50062445192.168.2.426.174.0.83
                                            Jan 15, 2025 02:52:56.233285904 CET50062445192.168.2.426.174.0.83
                                            Jan 15, 2025 02:52:56.233542919 CET50063445192.168.2.426.174.0.1
                                            Jan 15, 2025 02:52:56.238229036 CET4455006226.174.0.83192.168.2.4
                                            Jan 15, 2025 02:52:56.238286018 CET50062445192.168.2.426.174.0.83
                                            Jan 15, 2025 02:52:56.238471031 CET4455006326.174.0.1192.168.2.4
                                            Jan 15, 2025 02:52:56.238532066 CET50063445192.168.2.426.174.0.1
                                            Jan 15, 2025 02:52:56.238559008 CET50063445192.168.2.426.174.0.1
                                            Jan 15, 2025 02:52:56.238769054 CET50064445192.168.2.426.174.0.1
                                            Jan 15, 2025 02:52:56.243563890 CET4455006326.174.0.1192.168.2.4
                                            Jan 15, 2025 02:52:56.243619919 CET50063445192.168.2.426.174.0.1
                                            Jan 15, 2025 02:52:56.243619919 CET4455006426.174.0.1192.168.2.4
                                            Jan 15, 2025 02:52:56.243689060 CET50064445192.168.2.426.174.0.1
                                            Jan 15, 2025 02:52:56.243700981 CET50064445192.168.2.426.174.0.1
                                            Jan 15, 2025 02:52:56.248579979 CET4455006426.174.0.1192.168.2.4
                                            Jan 15, 2025 02:52:56.804616928 CET44550060212.221.152.2192.168.2.4
                                            Jan 15, 2025 02:52:56.804872990 CET50060445192.168.2.4212.221.152.2
                                            Jan 15, 2025 02:52:56.804969072 CET50060445192.168.2.4212.221.152.2
                                            Jan 15, 2025 02:52:56.805012941 CET50060445192.168.2.4212.221.152.2
                                            Jan 15, 2025 02:52:56.809930086 CET44550060212.221.152.2192.168.2.4
                                            Jan 15, 2025 02:52:56.809962034 CET44550060212.221.152.2192.168.2.4
                                            Jan 15, 2025 02:52:56.868784904 CET50065445192.168.2.4212.221.152.3
                                            Jan 15, 2025 02:52:56.873588085 CET44550065212.221.152.3192.168.2.4
                                            Jan 15, 2025 02:52:56.873688936 CET50065445192.168.2.4212.221.152.3
                                            Jan 15, 2025 02:52:56.873717070 CET50065445192.168.2.4212.221.152.3
                                            Jan 15, 2025 02:52:56.874188900 CET50066445192.168.2.4212.221.152.3
                                            Jan 15, 2025 02:52:56.878735065 CET44550065212.221.152.3192.168.2.4
                                            Jan 15, 2025 02:52:56.879007101 CET44550066212.221.152.3192.168.2.4
                                            Jan 15, 2025 02:52:56.879013062 CET50065445192.168.2.4212.221.152.3
                                            Jan 15, 2025 02:52:56.879080057 CET50066445192.168.2.4212.221.152.3
                                            Jan 15, 2025 02:52:56.879131079 CET50066445192.168.2.4212.221.152.3
                                            Jan 15, 2025 02:52:56.884004116 CET44550066212.221.152.3192.168.2.4
                                            Jan 15, 2025 02:52:57.186103106 CET44549929168.221.244.1192.168.2.4
                                            Jan 15, 2025 02:52:57.186216116 CET49929445192.168.2.4168.221.244.1
                                            Jan 15, 2025 02:52:57.186291933 CET49929445192.168.2.4168.221.244.1
                                            Jan 15, 2025 02:52:57.186314106 CET49929445192.168.2.4168.221.244.1
                                            Jan 15, 2025 02:52:57.191155910 CET44549929168.221.244.1192.168.2.4
                                            Jan 15, 2025 02:52:57.191189051 CET44549929168.221.244.1192.168.2.4
                                            Jan 15, 2025 02:52:57.978502989 CET50067445192.168.2.4155.84.144.164
                                            Jan 15, 2025 02:52:57.983326912 CET44550067155.84.144.164192.168.2.4
                                            Jan 15, 2025 02:52:57.983432055 CET50067445192.168.2.4155.84.144.164
                                            Jan 15, 2025 02:52:57.983555079 CET50067445192.168.2.4155.84.144.164
                                            Jan 15, 2025 02:52:57.983740091 CET50068445192.168.2.4155.84.144.1
                                            Jan 15, 2025 02:52:57.988372087 CET44550067155.84.144.164192.168.2.4
                                            Jan 15, 2025 02:52:57.988442898 CET50067445192.168.2.4155.84.144.164
                                            Jan 15, 2025 02:52:57.988583088 CET44550068155.84.144.1192.168.2.4
                                            Jan 15, 2025 02:52:57.988641024 CET50068445192.168.2.4155.84.144.1
                                            Jan 15, 2025 02:52:57.988722086 CET50068445192.168.2.4155.84.144.1
                                            Jan 15, 2025 02:52:57.989003897 CET50069445192.168.2.4155.84.144.1
                                            Jan 15, 2025 02:52:57.993612051 CET44550068155.84.144.1192.168.2.4
                                            Jan 15, 2025 02:52:57.993697882 CET50068445192.168.2.4155.84.144.1
                                            Jan 15, 2025 02:52:57.993855953 CET44550069155.84.144.1192.168.2.4
                                            Jan 15, 2025 02:52:57.993917942 CET50069445192.168.2.4155.84.144.1
                                            Jan 15, 2025 02:52:57.993971109 CET50069445192.168.2.4155.84.144.1
                                            Jan 15, 2025 02:52:57.998713970 CET44550069155.84.144.1192.168.2.4
                                            Jan 15, 2025 02:52:58.212487936 CET50070445192.168.2.460.232.169.1
                                            Jan 15, 2025 02:52:58.217346907 CET4455007060.232.169.1192.168.2.4
                                            Jan 15, 2025 02:52:58.217458963 CET50070445192.168.2.460.232.169.1
                                            Jan 15, 2025 02:52:58.217489958 CET50070445192.168.2.460.232.169.1
                                            Jan 15, 2025 02:52:58.222260952 CET4455007060.232.169.1192.168.2.4
                                            Jan 15, 2025 02:52:59.619337082 CET50072445192.168.2.4169.185.83.157
                                            Jan 15, 2025 02:52:59.622792006 CET44549953107.95.115.1192.168.2.4
                                            Jan 15, 2025 02:52:59.622876883 CET49953445192.168.2.4107.95.115.1
                                            Jan 15, 2025 02:52:59.622895956 CET49953445192.168.2.4107.95.115.1
                                            Jan 15, 2025 02:52:59.622929096 CET49953445192.168.2.4107.95.115.1
                                            Jan 15, 2025 02:52:59.624178886 CET44550072169.185.83.157192.168.2.4
                                            Jan 15, 2025 02:52:59.624252081 CET50072445192.168.2.4169.185.83.157
                                            Jan 15, 2025 02:52:59.624300003 CET50072445192.168.2.4169.185.83.157
                                            Jan 15, 2025 02:52:59.624463081 CET50073445192.168.2.4169.185.83.1
                                            Jan 15, 2025 02:52:59.627744913 CET44549953107.95.115.1192.168.2.4
                                            Jan 15, 2025 02:52:59.627756119 CET44549953107.95.115.1192.168.2.4
                                            Jan 15, 2025 02:52:59.629246950 CET44550072169.185.83.157192.168.2.4
                                            Jan 15, 2025 02:52:59.629266024 CET44550073169.185.83.1192.168.2.4
                                            Jan 15, 2025 02:52:59.629293919 CET50072445192.168.2.4169.185.83.157
                                            Jan 15, 2025 02:52:59.629369974 CET50073445192.168.2.4169.185.83.1
                                            Jan 15, 2025 02:52:59.629426956 CET50073445192.168.2.4169.185.83.1
                                            Jan 15, 2025 02:52:59.629997015 CET50076445192.168.2.4169.185.83.1
                                            Jan 15, 2025 02:52:59.634282112 CET44550073169.185.83.1192.168.2.4
                                            Jan 15, 2025 02:52:59.634337902 CET50073445192.168.2.4169.185.83.1
                                            Jan 15, 2025 02:52:59.634722948 CET44550076169.185.83.1192.168.2.4
                                            Jan 15, 2025 02:52:59.634776115 CET50076445192.168.2.4169.185.83.1
                                            Jan 15, 2025 02:52:59.634845972 CET50076445192.168.2.4169.185.83.1
                                            Jan 15, 2025 02:52:59.639612913 CET44550076169.185.83.1192.168.2.4
                                            Jan 15, 2025 02:53:00.196907997 CET50080445192.168.2.4168.221.244.1
                                            Jan 15, 2025 02:53:00.201766968 CET44550080168.221.244.1192.168.2.4
                                            Jan 15, 2025 02:53:00.201867104 CET50080445192.168.2.4168.221.244.1
                                            Jan 15, 2025 02:53:00.201867104 CET50080445192.168.2.4168.221.244.1
                                            Jan 15, 2025 02:53:00.206674099 CET44550080168.221.244.1192.168.2.4
                                            Jan 15, 2025 02:53:01.188899040 CET50085445192.168.2.4221.199.214.1
                                            Jan 15, 2025 02:53:01.194226027 CET44550085221.199.214.1192.168.2.4
                                            Jan 15, 2025 02:53:01.194303989 CET50085445192.168.2.4221.199.214.1
                                            Jan 15, 2025 02:53:01.196118116 CET50085445192.168.2.4221.199.214.1
                                            Jan 15, 2025 02:53:01.196252108 CET50086445192.168.2.4221.199.214.1
                                            Jan 15, 2025 02:53:01.201947927 CET44550085221.199.214.1192.168.2.4
                                            Jan 15, 2025 02:53:01.202009916 CET50085445192.168.2.4221.199.214.1
                                            Jan 15, 2025 02:53:01.202508926 CET44550086221.199.214.1192.168.2.4
                                            Jan 15, 2025 02:53:01.202563047 CET50086445192.168.2.4221.199.214.1
                                            Jan 15, 2025 02:53:01.203701019 CET50086445192.168.2.4221.199.214.1
                                            Jan 15, 2025 02:53:01.208559036 CET44550086221.199.214.1192.168.2.4
                                            Jan 15, 2025 02:53:01.208626032 CET50086445192.168.2.4221.199.214.1
                                            Jan 15, 2025 02:53:01.246537924 CET50089445192.168.2.4221.199.214.1
                                            Jan 15, 2025 02:53:01.251504898 CET44550089221.199.214.1192.168.2.4
                                            Jan 15, 2025 02:53:01.251586914 CET50089445192.168.2.4221.199.214.1
                                            Jan 15, 2025 02:53:01.254076004 CET50089445192.168.2.4221.199.214.1
                                            Jan 15, 2025 02:53:01.258959055 CET44550089221.199.214.1192.168.2.4
                                            Jan 15, 2025 02:53:01.637646914 CET44549976184.52.7.1192.168.2.4
                                            Jan 15, 2025 02:53:01.637733936 CET49976445192.168.2.4184.52.7.1
                                            Jan 15, 2025 02:53:01.639765978 CET49976445192.168.2.4184.52.7.1
                                            Jan 15, 2025 02:53:01.639807940 CET49976445192.168.2.4184.52.7.1
                                            Jan 15, 2025 02:53:01.644639969 CET44549976184.52.7.1192.168.2.4
                                            Jan 15, 2025 02:53:01.644651890 CET44549976184.52.7.1192.168.2.4
                                            Jan 15, 2025 02:53:02.587862015 CET50097445192.168.2.484.185.167.229
                                            Jan 15, 2025 02:53:02.592820883 CET4455009784.185.167.229192.168.2.4
                                            Jan 15, 2025 02:53:02.592943907 CET50097445192.168.2.484.185.167.229
                                            Jan 15, 2025 02:53:02.592986107 CET50097445192.168.2.484.185.167.229
                                            Jan 15, 2025 02:53:02.593095064 CET50098445192.168.2.484.185.167.1
                                            Jan 15, 2025 02:53:02.597899914 CET4455009784.185.167.229192.168.2.4
                                            Jan 15, 2025 02:53:02.597980022 CET50097445192.168.2.484.185.167.229
                                            Jan 15, 2025 02:53:02.598016024 CET4455009884.185.167.1192.168.2.4
                                            Jan 15, 2025 02:53:02.598093033 CET50098445192.168.2.484.185.167.1
                                            Jan 15, 2025 02:53:02.598217010 CET50098445192.168.2.484.185.167.1
                                            Jan 15, 2025 02:53:02.598685980 CET50099445192.168.2.484.185.167.1
                                            Jan 15, 2025 02:53:02.603029966 CET4455009884.185.167.1192.168.2.4
                                            Jan 15, 2025 02:53:02.603133917 CET50098445192.168.2.484.185.167.1
                                            Jan 15, 2025 02:53:02.603539944 CET4455009984.185.167.1192.168.2.4
                                            Jan 15, 2025 02:53:02.603616953 CET50099445192.168.2.484.185.167.1
                                            Jan 15, 2025 02:53:02.603660107 CET50099445192.168.2.484.185.167.1
                                            Jan 15, 2025 02:53:02.608462095 CET4455009984.185.167.1192.168.2.4
                                            Jan 15, 2025 02:53:02.634531975 CET50101445192.168.2.4107.95.115.1
                                            Jan 15, 2025 02:53:02.639494896 CET44550101107.95.115.1192.168.2.4
                                            Jan 15, 2025 02:53:02.639609098 CET50101445192.168.2.4107.95.115.1
                                            Jan 15, 2025 02:53:02.639674902 CET50101445192.168.2.4107.95.115.1
                                            Jan 15, 2025 02:53:02.644495964 CET44550101107.95.115.1192.168.2.4
                                            Jan 15, 2025 02:53:03.638428926 CET44550001119.78.29.1192.168.2.4
                                            Jan 15, 2025 02:53:03.638494015 CET50001445192.168.2.4119.78.29.1
                                            Jan 15, 2025 02:53:03.638555050 CET50001445192.168.2.4119.78.29.1
                                            Jan 15, 2025 02:53:03.638597012 CET50001445192.168.2.4119.78.29.1
                                            Jan 15, 2025 02:53:03.643325090 CET44550001119.78.29.1192.168.2.4
                                            Jan 15, 2025 02:53:03.643415928 CET44550001119.78.29.1192.168.2.4
                                            Jan 15, 2025 02:53:03.915946007 CET50111445192.168.2.4131.241.79.81
                                            Jan 15, 2025 02:53:03.920766115 CET44550111131.241.79.81192.168.2.4
                                            Jan 15, 2025 02:53:03.920855045 CET50111445192.168.2.4131.241.79.81
                                            Jan 15, 2025 02:53:03.920921087 CET50111445192.168.2.4131.241.79.81
                                            Jan 15, 2025 02:53:03.921099901 CET50112445192.168.2.4131.241.79.1
                                            Jan 15, 2025 02:53:03.925980091 CET44550112131.241.79.1192.168.2.4
                                            Jan 15, 2025 02:53:03.925988913 CET44550111131.241.79.81192.168.2.4
                                            Jan 15, 2025 02:53:03.926048040 CET50111445192.168.2.4131.241.79.81
                                            Jan 15, 2025 02:53:03.926126003 CET50112445192.168.2.4131.241.79.1
                                            Jan 15, 2025 02:53:03.926126003 CET50112445192.168.2.4131.241.79.1
                                            Jan 15, 2025 02:53:03.926409006 CET50113445192.168.2.4131.241.79.1
                                            Jan 15, 2025 02:53:03.931039095 CET44550112131.241.79.1192.168.2.4
                                            Jan 15, 2025 02:53:03.931081057 CET50112445192.168.2.4131.241.79.1
                                            Jan 15, 2025 02:53:03.931163073 CET44550113131.241.79.1192.168.2.4
                                            Jan 15, 2025 02:53:03.931219101 CET50113445192.168.2.4131.241.79.1
                                            Jan 15, 2025 02:53:03.931248903 CET50113445192.168.2.4131.241.79.1
                                            Jan 15, 2025 02:53:03.936079979 CET44550113131.241.79.1192.168.2.4
                                            Jan 15, 2025 02:53:04.665600061 CET50119445192.168.2.4184.52.7.1
                                            Jan 15, 2025 02:53:04.670367956 CET44550119184.52.7.1192.168.2.4
                                            Jan 15, 2025 02:53:04.670480967 CET50119445192.168.2.4184.52.7.1
                                            Jan 15, 2025 02:53:04.670512915 CET50119445192.168.2.4184.52.7.1
                                            Jan 15, 2025 02:53:04.675348997 CET44550119184.52.7.1192.168.2.4
                                            Jan 15, 2025 02:53:05.150331974 CET50124445192.168.2.453.167.126.194
                                            Jan 15, 2025 02:53:05.155280113 CET4455012453.167.126.194192.168.2.4
                                            Jan 15, 2025 02:53:05.155405045 CET50124445192.168.2.453.167.126.194
                                            Jan 15, 2025 02:53:05.155420065 CET50124445192.168.2.453.167.126.194
                                            Jan 15, 2025 02:53:05.155553102 CET50125445192.168.2.453.167.126.1
                                            Jan 15, 2025 02:53:05.160465002 CET4455012553.167.126.1192.168.2.4
                                            Jan 15, 2025 02:53:05.160509109 CET4455012453.167.126.194192.168.2.4
                                            Jan 15, 2025 02:53:05.160569906 CET50125445192.168.2.453.167.126.1
                                            Jan 15, 2025 02:53:05.160583973 CET50124445192.168.2.453.167.126.194
                                            Jan 15, 2025 02:53:05.160599947 CET50125445192.168.2.453.167.126.1
                                            Jan 15, 2025 02:53:05.161119938 CET50126445192.168.2.453.167.126.1
                                            Jan 15, 2025 02:53:05.165564060 CET4455012553.167.126.1192.168.2.4
                                            Jan 15, 2025 02:53:05.165621042 CET50125445192.168.2.453.167.126.1
                                            Jan 15, 2025 02:53:05.165987015 CET4455012653.167.126.1192.168.2.4
                                            Jan 15, 2025 02:53:05.166058064 CET50126445192.168.2.453.167.126.1
                                            Jan 15, 2025 02:53:05.166094065 CET50126445192.168.2.453.167.126.1
                                            Jan 15, 2025 02:53:05.171060085 CET4455012653.167.126.1192.168.2.4
                                            Jan 15, 2025 02:53:05.736999035 CET4455002236.159.231.1192.168.2.4
                                            Jan 15, 2025 02:53:05.737060070 CET50022445192.168.2.436.159.231.1
                                            Jan 15, 2025 02:53:05.737118006 CET50022445192.168.2.436.159.231.1
                                            Jan 15, 2025 02:53:05.737170935 CET50022445192.168.2.436.159.231.1
                                            Jan 15, 2025 02:53:05.742016077 CET4455002236.159.231.1192.168.2.4
                                            Jan 15, 2025 02:53:05.742029905 CET4455002236.159.231.1192.168.2.4
                                            Jan 15, 2025 02:53:05.790677071 CET50130445192.168.2.436.159.231.2
                                            Jan 15, 2025 02:53:05.795429945 CET4455013036.159.231.2192.168.2.4
                                            Jan 15, 2025 02:53:05.795483112 CET50130445192.168.2.436.159.231.2
                                            Jan 15, 2025 02:53:05.795630932 CET50130445192.168.2.436.159.231.2
                                            Jan 15, 2025 02:53:05.796111107 CET50131445192.168.2.436.159.231.2
                                            Jan 15, 2025 02:53:05.800492048 CET4455013036.159.231.2192.168.2.4
                                            Jan 15, 2025 02:53:05.800578117 CET50130445192.168.2.436.159.231.2
                                            Jan 15, 2025 02:53:05.800977945 CET4455013136.159.231.2192.168.2.4
                                            Jan 15, 2025 02:53:05.801086903 CET50131445192.168.2.436.159.231.2
                                            Jan 15, 2025 02:53:05.801086903 CET50131445192.168.2.436.159.231.2
                                            Jan 15, 2025 02:53:05.805883884 CET4455013136.159.231.2192.168.2.4
                                            Jan 15, 2025 02:53:06.306560040 CET50135445192.168.2.4132.89.40.229
                                            Jan 15, 2025 02:53:06.311431885 CET44550135132.89.40.229192.168.2.4
                                            Jan 15, 2025 02:53:06.311539888 CET50135445192.168.2.4132.89.40.229
                                            Jan 15, 2025 02:53:06.311539888 CET50135445192.168.2.4132.89.40.229
                                            Jan 15, 2025 02:53:06.311644077 CET50136445192.168.2.4132.89.40.1
                                            Jan 15, 2025 02:53:06.316490889 CET44550136132.89.40.1192.168.2.4
                                            Jan 15, 2025 02:53:06.316556931 CET50136445192.168.2.4132.89.40.1
                                            Jan 15, 2025 02:53:06.316569090 CET50136445192.168.2.4132.89.40.1
                                            Jan 15, 2025 02:53:06.316587925 CET44550135132.89.40.229192.168.2.4
                                            Jan 15, 2025 02:53:06.316632032 CET50135445192.168.2.4132.89.40.229
                                            Jan 15, 2025 02:53:06.316802979 CET50137445192.168.2.4132.89.40.1
                                            Jan 15, 2025 02:53:06.321502924 CET44550136132.89.40.1192.168.2.4
                                            Jan 15, 2025 02:53:06.321542978 CET50136445192.168.2.4132.89.40.1
                                            Jan 15, 2025 02:53:06.321614027 CET44550137132.89.40.1192.168.2.4
                                            Jan 15, 2025 02:53:06.321674109 CET50137445192.168.2.4132.89.40.1
                                            Jan 15, 2025 02:53:06.321716070 CET50137445192.168.2.4132.89.40.1
                                            Jan 15, 2025 02:53:06.326497078 CET44550137132.89.40.1192.168.2.4
                                            Jan 15, 2025 02:53:06.650043011 CET50141445192.168.2.4119.78.29.1
                                            Jan 15, 2025 02:53:06.654880047 CET44550141119.78.29.1192.168.2.4
                                            Jan 15, 2025 02:53:06.655067921 CET50141445192.168.2.4119.78.29.1
                                            Jan 15, 2025 02:53:06.655067921 CET50141445192.168.2.4119.78.29.1
                                            Jan 15, 2025 02:53:06.659835100 CET44550141119.78.29.1192.168.2.4
                                            Jan 15, 2025 02:53:07.168872118 CET4455004141.203.92.1192.168.2.4
                                            Jan 15, 2025 02:53:07.168922901 CET50041445192.168.2.441.203.92.1
                                            Jan 15, 2025 02:53:07.168973923 CET50041445192.168.2.441.203.92.1
                                            Jan 15, 2025 02:53:07.169030905 CET50041445192.168.2.441.203.92.1
                                            Jan 15, 2025 02:53:07.173753023 CET4455004141.203.92.1192.168.2.4
                                            Jan 15, 2025 02:53:07.173857927 CET4455004141.203.92.1192.168.2.4
                                            Jan 15, 2025 02:53:07.228173018 CET50145445192.168.2.441.203.92.2
                                            Jan 15, 2025 02:53:07.232999086 CET4455014541.203.92.2192.168.2.4
                                            Jan 15, 2025 02:53:07.233077049 CET50145445192.168.2.441.203.92.2
                                            Jan 15, 2025 02:53:07.233104944 CET50145445192.168.2.441.203.92.2
                                            Jan 15, 2025 02:53:07.233411074 CET50146445192.168.2.441.203.92.2
                                            Jan 15, 2025 02:53:07.237972975 CET4455014541.203.92.2192.168.2.4
                                            Jan 15, 2025 02:53:07.238033056 CET50145445192.168.2.441.203.92.2
                                            Jan 15, 2025 02:53:07.238210917 CET4455014641.203.92.2192.168.2.4
                                            Jan 15, 2025 02:53:07.238272905 CET50146445192.168.2.441.203.92.2
                                            Jan 15, 2025 02:53:07.238317966 CET50146445192.168.2.441.203.92.2
                                            Jan 15, 2025 02:53:07.243084908 CET4455014641.203.92.2192.168.2.4
                                            Jan 15, 2025 02:53:07.384776115 CET50149445192.168.2.4105.86.166.51
                                            Jan 15, 2025 02:53:07.389514923 CET44550149105.86.166.51192.168.2.4
                                            Jan 15, 2025 02:53:07.389614105 CET50149445192.168.2.4105.86.166.51
                                            Jan 15, 2025 02:53:07.389614105 CET50149445192.168.2.4105.86.166.51
                                            Jan 15, 2025 02:53:07.389703989 CET50150445192.168.2.4105.86.166.1
                                            Jan 15, 2025 02:53:07.394443989 CET44550150105.86.166.1192.168.2.4
                                            Jan 15, 2025 02:53:07.394506931 CET50150445192.168.2.4105.86.166.1
                                            Jan 15, 2025 02:53:07.394562006 CET50150445192.168.2.4105.86.166.1
                                            Jan 15, 2025 02:53:07.394726992 CET44550149105.86.166.51192.168.2.4
                                            Jan 15, 2025 02:53:07.394783974 CET50149445192.168.2.4105.86.166.51
                                            Jan 15, 2025 02:53:07.394887924 CET50151445192.168.2.4105.86.166.1
                                            Jan 15, 2025 02:53:07.399364948 CET44550150105.86.166.1192.168.2.4
                                            Jan 15, 2025 02:53:07.399416924 CET50150445192.168.2.4105.86.166.1
                                            Jan 15, 2025 02:53:07.399713993 CET44550151105.86.166.1192.168.2.4
                                            Jan 15, 2025 02:53:07.399774075 CET50151445192.168.2.4105.86.166.1
                                            Jan 15, 2025 02:53:07.399796009 CET50151445192.168.2.4105.86.166.1
                                            Jan 15, 2025 02:53:07.404558897 CET44550151105.86.166.1192.168.2.4
                                            Jan 15, 2025 02:53:07.449599981 CET44550037134.23.254.1192.168.2.4
                                            Jan 15, 2025 02:53:07.449692011 CET50037445192.168.2.4134.23.254.1
                                            Jan 15, 2025 02:53:07.449759007 CET50037445192.168.2.4134.23.254.1
                                            Jan 15, 2025 02:53:07.449840069 CET50037445192.168.2.4134.23.254.1
                                            Jan 15, 2025 02:53:07.454571962 CET44550037134.23.254.1192.168.2.4
                                            Jan 15, 2025 02:53:07.454585075 CET44550037134.23.254.1192.168.2.4
                                            Jan 15, 2025 02:53:07.509488106 CET50152445192.168.2.4134.23.254.2
                                            Jan 15, 2025 02:53:07.514291048 CET44550152134.23.254.2192.168.2.4
                                            Jan 15, 2025 02:53:07.514394045 CET50152445192.168.2.4134.23.254.2
                                            Jan 15, 2025 02:53:07.514409065 CET50152445192.168.2.4134.23.254.2
                                            Jan 15, 2025 02:53:07.514784098 CET50153445192.168.2.4134.23.254.2
                                            Jan 15, 2025 02:53:07.519339085 CET44550152134.23.254.2192.168.2.4
                                            Jan 15, 2025 02:53:07.519401073 CET50152445192.168.2.4134.23.254.2
                                            Jan 15, 2025 02:53:07.519649029 CET44550153134.23.254.2192.168.2.4
                                            Jan 15, 2025 02:53:07.519710064 CET50153445192.168.2.4134.23.254.2
                                            Jan 15, 2025 02:53:07.519750118 CET50153445192.168.2.4134.23.254.2
                                            Jan 15, 2025 02:53:07.524564981 CET44550153134.23.254.2192.168.2.4
                                            Jan 15, 2025 02:53:07.688411951 CET44550040198.7.103.1192.168.2.4
                                            Jan 15, 2025 02:53:07.688493967 CET50040445192.168.2.4198.7.103.1
                                            Jan 15, 2025 02:53:07.688530922 CET50040445192.168.2.4198.7.103.1
                                            Jan 15, 2025 02:53:07.688581944 CET50040445192.168.2.4198.7.103.1
                                            Jan 15, 2025 02:53:07.693365097 CET44550040198.7.103.1192.168.2.4
                                            Jan 15, 2025 02:53:07.693380117 CET44550040198.7.103.1192.168.2.4
                                            Jan 15, 2025 02:53:08.407109022 CET50160445192.168.2.4104.62.87.219
                                            Jan 15, 2025 02:53:08.411904097 CET44550160104.62.87.219192.168.2.4
                                            Jan 15, 2025 02:53:08.413916111 CET50160445192.168.2.4104.62.87.219
                                            Jan 15, 2025 02:53:08.414216042 CET50160445192.168.2.4104.62.87.219
                                            Jan 15, 2025 02:53:08.414364100 CET50161445192.168.2.4104.62.87.1
                                            Jan 15, 2025 02:53:08.419070959 CET44550160104.62.87.219192.168.2.4
                                            Jan 15, 2025 02:53:08.419246912 CET44550161104.62.87.1192.168.2.4
                                            Jan 15, 2025 02:53:08.419316053 CET50160445192.168.2.4104.62.87.219
                                            Jan 15, 2025 02:53:08.419338942 CET50161445192.168.2.4104.62.87.1
                                            Jan 15, 2025 02:53:08.421860933 CET50161445192.168.2.4104.62.87.1
                                            Jan 15, 2025 02:53:08.425944090 CET50162445192.168.2.4104.62.87.1
                                            Jan 15, 2025 02:53:08.426799059 CET44550161104.62.87.1192.168.2.4
                                            Jan 15, 2025 02:53:08.426861048 CET50161445192.168.2.4104.62.87.1
                                            Jan 15, 2025 02:53:08.430851936 CET44550162104.62.87.1192.168.2.4
                                            Jan 15, 2025 02:53:08.433924913 CET50162445192.168.2.4104.62.87.1
                                            Jan 15, 2025 02:53:08.437083960 CET50162445192.168.2.4104.62.87.1
                                            Jan 15, 2025 02:53:08.441911936 CET44550162104.62.87.1192.168.2.4
                                            Jan 15, 2025 02:53:09.354891062 CET50169445192.168.2.431.73.20.158
                                            Jan 15, 2025 02:53:09.359771013 CET4455016931.73.20.158192.168.2.4
                                            Jan 15, 2025 02:53:09.359899044 CET50169445192.168.2.431.73.20.158
                                            Jan 15, 2025 02:53:09.359981060 CET50169445192.168.2.431.73.20.158
                                            Jan 15, 2025 02:53:09.360160112 CET50170445192.168.2.431.73.20.1
                                            Jan 15, 2025 02:53:09.364962101 CET4455016931.73.20.158192.168.2.4
                                            Jan 15, 2025 02:53:09.364979029 CET4455017031.73.20.1192.168.2.4
                                            Jan 15, 2025 02:53:09.365026951 CET50169445192.168.2.431.73.20.158
                                            Jan 15, 2025 02:53:09.365058899 CET50170445192.168.2.431.73.20.1
                                            Jan 15, 2025 02:53:09.365118027 CET50170445192.168.2.431.73.20.1
                                            Jan 15, 2025 02:53:09.365366936 CET50171445192.168.2.431.73.20.1
                                            Jan 15, 2025 02:53:09.370008945 CET4455017031.73.20.1192.168.2.4
                                            Jan 15, 2025 02:53:09.370121002 CET50170445192.168.2.431.73.20.1
                                            Jan 15, 2025 02:53:09.370223999 CET4455017131.73.20.1192.168.2.4
                                            Jan 15, 2025 02:53:09.370290041 CET50171445192.168.2.431.73.20.1
                                            Jan 15, 2025 02:53:09.370347023 CET50171445192.168.2.431.73.20.1
                                            Jan 15, 2025 02:53:09.375189066 CET4455017131.73.20.1192.168.2.4
                                            Jan 15, 2025 02:53:09.704056025 CET4455004443.143.201.1192.168.2.4
                                            Jan 15, 2025 02:53:09.704134941 CET50044445192.168.2.443.143.201.1
                                            Jan 15, 2025 02:53:09.705847979 CET50044445192.168.2.443.143.201.1
                                            Jan 15, 2025 02:53:09.705883980 CET50044445192.168.2.443.143.201.1
                                            Jan 15, 2025 02:53:09.710688114 CET4455004443.143.201.1192.168.2.4
                                            Jan 15, 2025 02:53:09.710701942 CET4455004443.143.201.1192.168.2.4
                                            Jan 15, 2025 02:53:10.244056940 CET50177445192.168.2.4211.227.176.102
                                            Jan 15, 2025 02:53:10.249000072 CET44550177211.227.176.102192.168.2.4
                                            Jan 15, 2025 02:53:10.249085903 CET50177445192.168.2.4211.227.176.102
                                            Jan 15, 2025 02:53:10.249123096 CET50177445192.168.2.4211.227.176.102
                                            Jan 15, 2025 02:53:10.249281883 CET50178445192.168.2.4211.227.176.1
                                            Jan 15, 2025 02:53:10.254060984 CET44550178211.227.176.1192.168.2.4
                                            Jan 15, 2025 02:53:10.254184008 CET44550177211.227.176.102192.168.2.4
                                            Jan 15, 2025 02:53:10.254256010 CET50177445192.168.2.4211.227.176.102
                                            Jan 15, 2025 02:53:10.254266977 CET50178445192.168.2.4211.227.176.1
                                            Jan 15, 2025 02:53:10.254307985 CET50178445192.168.2.4211.227.176.1
                                            Jan 15, 2025 02:53:10.254595041 CET50179445192.168.2.4211.227.176.1
                                            Jan 15, 2025 02:53:10.259429932 CET44550178211.227.176.1192.168.2.4
                                            Jan 15, 2025 02:53:10.259444952 CET44550179211.227.176.1192.168.2.4
                                            Jan 15, 2025 02:53:10.259485006 CET50178445192.168.2.4211.227.176.1
                                            Jan 15, 2025 02:53:10.259529114 CET50179445192.168.2.4211.227.176.1
                                            Jan 15, 2025 02:53:10.259561062 CET50179445192.168.2.4211.227.176.1
                                            Jan 15, 2025 02:53:10.264296055 CET44550179211.227.176.1192.168.2.4
                                            Jan 15, 2025 02:53:10.696887970 CET50183445192.168.2.4198.7.103.1
                                            Jan 15, 2025 02:53:10.701735973 CET44550183198.7.103.1192.168.2.4
                                            Jan 15, 2025 02:53:10.701822042 CET50183445192.168.2.4198.7.103.1
                                            Jan 15, 2025 02:53:10.701854944 CET50183445192.168.2.4198.7.103.1
                                            Jan 15, 2025 02:53:10.706631899 CET44550183198.7.103.1192.168.2.4
                                            Jan 15, 2025 02:53:11.080499887 CET50186445192.168.2.4137.69.251.35
                                            Jan 15, 2025 02:53:11.085355997 CET44550186137.69.251.35192.168.2.4
                                            Jan 15, 2025 02:53:11.085426092 CET50186445192.168.2.4137.69.251.35
                                            Jan 15, 2025 02:53:11.085520983 CET50186445192.168.2.4137.69.251.35
                                            Jan 15, 2025 02:53:11.085658073 CET50187445192.168.2.4137.69.251.1
                                            Jan 15, 2025 02:53:11.090321064 CET44550186137.69.251.35192.168.2.4
                                            Jan 15, 2025 02:53:11.090384007 CET50186445192.168.2.4137.69.251.35
                                            Jan 15, 2025 02:53:11.090498924 CET44550187137.69.251.1192.168.2.4
                                            Jan 15, 2025 02:53:11.090560913 CET50187445192.168.2.4137.69.251.1
                                            Jan 15, 2025 02:53:11.090677977 CET50187445192.168.2.4137.69.251.1
                                            Jan 15, 2025 02:53:11.091104984 CET50188445192.168.2.4137.69.251.1
                                            Jan 15, 2025 02:53:11.095483065 CET44550187137.69.251.1192.168.2.4
                                            Jan 15, 2025 02:53:11.095546007 CET50187445192.168.2.4137.69.251.1
                                            Jan 15, 2025 02:53:11.095858097 CET44550188137.69.251.1192.168.2.4
                                            Jan 15, 2025 02:53:11.095917940 CET50188445192.168.2.4137.69.251.1
                                            Jan 15, 2025 02:53:11.095953941 CET50188445192.168.2.4137.69.251.1
                                            Jan 15, 2025 02:53:11.100742102 CET44550188137.69.251.1192.168.2.4
                                            Jan 15, 2025 02:53:11.498869896 CET44550046166.216.208.1192.168.2.4
                                            Jan 15, 2025 02:53:11.498986006 CET50046445192.168.2.4166.216.208.1
                                            Jan 15, 2025 02:53:11.516917944 CET50046445192.168.2.4166.216.208.1
                                            Jan 15, 2025 02:53:11.516983986 CET50046445192.168.2.4166.216.208.1
                                            Jan 15, 2025 02:53:11.521701097 CET44550046166.216.208.1192.168.2.4
                                            Jan 15, 2025 02:53:11.521730900 CET44550046166.216.208.1192.168.2.4
                                            Jan 15, 2025 02:53:11.592052937 CET50193445192.168.2.4166.216.208.2
                                            Jan 15, 2025 02:53:11.596894026 CET44550193166.216.208.2192.168.2.4
                                            Jan 15, 2025 02:53:11.596961021 CET50193445192.168.2.4166.216.208.2
                                            Jan 15, 2025 02:53:11.597165108 CET50193445192.168.2.4166.216.208.2
                                            Jan 15, 2025 02:53:11.597649097 CET50194445192.168.2.4166.216.208.2
                                            Jan 15, 2025 02:53:11.601947069 CET44550193166.216.208.2192.168.2.4
                                            Jan 15, 2025 02:53:11.602056026 CET50193445192.168.2.4166.216.208.2
                                            Jan 15, 2025 02:53:11.602416039 CET44550194166.216.208.2192.168.2.4
                                            Jan 15, 2025 02:53:11.602467060 CET50194445192.168.2.4166.216.208.2
                                            Jan 15, 2025 02:53:11.616491079 CET50194445192.168.2.4166.216.208.2
                                            Jan 15, 2025 02:53:11.621306896 CET44550194166.216.208.2192.168.2.4
                                            Jan 15, 2025 02:53:11.716089010 CET44550049181.107.70.1192.168.2.4
                                            Jan 15, 2025 02:53:11.716186047 CET50049445192.168.2.4181.107.70.1
                                            Jan 15, 2025 02:53:11.716186047 CET50049445192.168.2.4181.107.70.1
                                            Jan 15, 2025 02:53:11.716375113 CET50049445192.168.2.4181.107.70.1
                                            Jan 15, 2025 02:53:11.721030951 CET44550049181.107.70.1192.168.2.4
                                            Jan 15, 2025 02:53:11.721141100 CET44550049181.107.70.1192.168.2.4
                                            Jan 15, 2025 02:53:11.925692081 CET50196445192.168.2.4125.213.129.60
                                            Jan 15, 2025 02:53:11.930560112 CET44550196125.213.129.60192.168.2.4
                                            Jan 15, 2025 02:53:11.930609941 CET50196445192.168.2.4125.213.129.60
                                            Jan 15, 2025 02:53:11.930818081 CET50196445192.168.2.4125.213.129.60
                                            Jan 15, 2025 02:53:11.930839062 CET50197445192.168.2.4125.213.129.1
                                            Jan 15, 2025 02:53:11.935667038 CET44550196125.213.129.60192.168.2.4
                                            Jan 15, 2025 02:53:11.935683966 CET44550197125.213.129.1192.168.2.4
                                            Jan 15, 2025 02:53:11.935714960 CET50196445192.168.2.4125.213.129.60
                                            Jan 15, 2025 02:53:11.935753107 CET50197445192.168.2.4125.213.129.1
                                            Jan 15, 2025 02:53:11.936089993 CET50197445192.168.2.4125.213.129.1
                                            Jan 15, 2025 02:53:11.936599970 CET50198445192.168.2.4125.213.129.1
                                            Jan 15, 2025 02:53:11.940922976 CET44550197125.213.129.1192.168.2.4
                                            Jan 15, 2025 02:53:11.940963984 CET50197445192.168.2.4125.213.129.1
                                            Jan 15, 2025 02:53:11.941420078 CET44550198125.213.129.1192.168.2.4
                                            Jan 15, 2025 02:53:11.941473007 CET50198445192.168.2.4125.213.129.1
                                            Jan 15, 2025 02:53:11.942725897 CET50198445192.168.2.4125.213.129.1
                                            Jan 15, 2025 02:53:11.947597980 CET44550198125.213.129.1192.168.2.4
                                            Jan 15, 2025 02:53:12.712485075 CET50204445192.168.2.443.143.201.1
                                            Jan 15, 2025 02:53:12.719398022 CET4455020443.143.201.1192.168.2.4
                                            Jan 15, 2025 02:53:12.719474077 CET50204445192.168.2.443.143.201.1
                                            Jan 15, 2025 02:53:12.719515085 CET50204445192.168.2.443.143.201.1
                                            Jan 15, 2025 02:53:12.725222111 CET4455020443.143.201.1192.168.2.4
                                            Jan 15, 2025 02:53:13.471178055 CET44550052138.194.222.1192.168.2.4
                                            Jan 15, 2025 02:53:13.473983049 CET50052445192.168.2.4138.194.222.1
                                            Jan 15, 2025 02:53:13.474039078 CET50052445192.168.2.4138.194.222.1
                                            Jan 15, 2025 02:53:13.474093914 CET50052445192.168.2.4138.194.222.1
                                            Jan 15, 2025 02:53:13.478864908 CET44550052138.194.222.1192.168.2.4
                                            Jan 15, 2025 02:53:13.478876114 CET44550052138.194.222.1192.168.2.4
                                            Jan 15, 2025 02:53:13.525120020 CET50213445192.168.2.4138.194.222.2
                                            Jan 15, 2025 02:53:13.529906034 CET44550213138.194.222.2192.168.2.4
                                            Jan 15, 2025 02:53:13.529969931 CET50213445192.168.2.4138.194.222.2
                                            Jan 15, 2025 02:53:13.529999971 CET50213445192.168.2.4138.194.222.2
                                            Jan 15, 2025 02:53:13.530452013 CET50214445192.168.2.4138.194.222.2
                                            Jan 15, 2025 02:53:13.534924030 CET44550213138.194.222.2192.168.2.4
                                            Jan 15, 2025 02:53:13.534985065 CET50213445192.168.2.4138.194.222.2
                                            Jan 15, 2025 02:53:13.535259962 CET44550214138.194.222.2192.168.2.4
                                            Jan 15, 2025 02:53:13.535352945 CET50214445192.168.2.4138.194.222.2
                                            Jan 15, 2025 02:53:13.535352945 CET50214445192.168.2.4138.194.222.2
                                            Jan 15, 2025 02:53:13.540138006 CET44550214138.194.222.2192.168.2.4
                                            Jan 15, 2025 02:53:13.737107038 CET44550055203.110.14.1192.168.2.4
                                            Jan 15, 2025 02:53:13.737181902 CET50055445192.168.2.4203.110.14.1
                                            Jan 15, 2025 02:53:13.737229109 CET50055445192.168.2.4203.110.14.1
                                            Jan 15, 2025 02:53:13.737248898 CET50055445192.168.2.4203.110.14.1
                                            Jan 15, 2025 02:53:13.742043018 CET44550055203.110.14.1192.168.2.4
                                            Jan 15, 2025 02:53:13.742053986 CET44550055203.110.14.1192.168.2.4
                                            Jan 15, 2025 02:53:14.728198051 CET50228445192.168.2.4181.107.70.1
                                            Jan 15, 2025 02:53:14.733026028 CET44550228181.107.70.1192.168.2.4
                                            Jan 15, 2025 02:53:14.733105898 CET50228445192.168.2.4181.107.70.1
                                            Jan 15, 2025 02:53:14.733146906 CET50228445192.168.2.4181.107.70.1
                                            Jan 15, 2025 02:53:14.737903118 CET44550228181.107.70.1192.168.2.4
                                            Jan 15, 2025 02:53:15.684762955 CET44550056215.244.84.1192.168.2.4
                                            Jan 15, 2025 02:53:15.685972929 CET50056445192.168.2.4215.244.84.1
                                            Jan 15, 2025 02:53:15.686119080 CET50056445192.168.2.4215.244.84.1
                                            Jan 15, 2025 02:53:15.686196089 CET50056445192.168.2.4215.244.84.1
                                            Jan 15, 2025 02:53:15.690835953 CET44550056215.244.84.1192.168.2.4
                                            Jan 15, 2025 02:53:15.690902948 CET44550056215.244.84.1192.168.2.4
                                            Jan 15, 2025 02:53:15.735425949 CET44550059193.32.83.1192.168.2.4
                                            Jan 15, 2025 02:53:15.737920046 CET50059445192.168.2.4193.32.83.1
                                            Jan 15, 2025 02:53:15.737951994 CET50059445192.168.2.4193.32.83.1
                                            Jan 15, 2025 02:53:15.737973928 CET50059445192.168.2.4193.32.83.1
                                            Jan 15, 2025 02:53:15.743155956 CET44550059193.32.83.1192.168.2.4
                                            Jan 15, 2025 02:53:15.743168116 CET44550059193.32.83.1192.168.2.4
                                            Jan 15, 2025 02:53:15.743880033 CET50240445192.168.2.4215.244.84.2
                                            Jan 15, 2025 02:53:15.748723984 CET44550240215.244.84.2192.168.2.4
                                            Jan 15, 2025 02:53:15.749941111 CET50240445192.168.2.4215.244.84.2
                                            Jan 15, 2025 02:53:15.749957085 CET50240445192.168.2.4215.244.84.2
                                            Jan 15, 2025 02:53:15.750256062 CET50241445192.168.2.4215.244.84.2
                                            Jan 15, 2025 02:53:15.754997015 CET44550240215.244.84.2192.168.2.4
                                            Jan 15, 2025 02:53:15.755119085 CET44550241215.244.84.2192.168.2.4
                                            Jan 15, 2025 02:53:15.755165100 CET50240445192.168.2.4215.244.84.2
                                            Jan 15, 2025 02:53:15.755342007 CET50241445192.168.2.4215.244.84.2
                                            Jan 15, 2025 02:53:15.755342007 CET50241445192.168.2.4215.244.84.2
                                            Jan 15, 2025 02:53:15.760235071 CET44550241215.244.84.2192.168.2.4
                                            Jan 15, 2025 02:53:16.745270014 CET50257445192.168.2.4203.110.14.1
                                            Jan 15, 2025 02:53:16.750180006 CET44550257203.110.14.1192.168.2.4
                                            Jan 15, 2025 02:53:16.750257969 CET50257445192.168.2.4203.110.14.1
                                            Jan 15, 2025 02:53:16.751214981 CET50257445192.168.2.4203.110.14.1
                                            Jan 15, 2025 02:53:16.756093025 CET44550257203.110.14.1192.168.2.4
                                            Jan 15, 2025 02:53:17.559716940 CET44550061201.23.224.1192.168.2.4
                                            Jan 15, 2025 02:53:17.559978962 CET50061445192.168.2.4201.23.224.1
                                            Jan 15, 2025 02:53:17.559978962 CET50061445192.168.2.4201.23.224.1
                                            Jan 15, 2025 02:53:17.559978962 CET50061445192.168.2.4201.23.224.1
                                            Jan 15, 2025 02:53:17.564944029 CET44550061201.23.224.1192.168.2.4
                                            Jan 15, 2025 02:53:17.564974070 CET44550061201.23.224.1192.168.2.4
                                            Jan 15, 2025 02:53:17.607444048 CET4455006426.174.0.1192.168.2.4
                                            Jan 15, 2025 02:53:17.607507944 CET50064445192.168.2.426.174.0.1
                                            Jan 15, 2025 02:53:17.607549906 CET50064445192.168.2.426.174.0.1
                                            Jan 15, 2025 02:53:17.607599020 CET50064445192.168.2.426.174.0.1
                                            Jan 15, 2025 02:53:17.612466097 CET4455006426.174.0.1192.168.2.4
                                            Jan 15, 2025 02:53:17.612483978 CET4455006426.174.0.1192.168.2.4
                                            Jan 15, 2025 02:53:17.619477034 CET50271445192.168.2.4201.23.224.2
                                            Jan 15, 2025 02:53:17.624310017 CET44550271201.23.224.2192.168.2.4
                                            Jan 15, 2025 02:53:17.624371052 CET50271445192.168.2.4201.23.224.2
                                            Jan 15, 2025 02:53:17.624617100 CET50271445192.168.2.4201.23.224.2
                                            Jan 15, 2025 02:53:17.624883890 CET50272445192.168.2.4201.23.224.2
                                            Jan 15, 2025 02:53:17.629404068 CET44550271201.23.224.2192.168.2.4
                                            Jan 15, 2025 02:53:17.629446030 CET50271445192.168.2.4201.23.224.2
                                            Jan 15, 2025 02:53:17.629674911 CET44550272201.23.224.2192.168.2.4
                                            Jan 15, 2025 02:53:17.629786968 CET50272445192.168.2.4201.23.224.2
                                            Jan 15, 2025 02:53:17.629825115 CET50272445192.168.2.4201.23.224.2
                                            Jan 15, 2025 02:53:17.634630919 CET44550272201.23.224.2192.168.2.4
                                            Jan 15, 2025 02:53:18.248963118 CET44550066212.221.152.3192.168.2.4
                                            Jan 15, 2025 02:53:18.252073050 CET50066445192.168.2.4212.221.152.3
                                            Jan 15, 2025 02:53:18.252108097 CET50066445192.168.2.4212.221.152.3
                                            Jan 15, 2025 02:53:18.252149105 CET50066445192.168.2.4212.221.152.3
                                            Jan 15, 2025 02:53:18.257064104 CET44550066212.221.152.3192.168.2.4
                                            Jan 15, 2025 02:53:18.257093906 CET44550066212.221.152.3192.168.2.4
                                            Jan 15, 2025 02:53:18.743845940 CET50294445192.168.2.4193.32.83.1
                                            Jan 15, 2025 02:53:18.748735905 CET44550294193.32.83.1192.168.2.4
                                            Jan 15, 2025 02:53:18.748831987 CET50294445192.168.2.4193.32.83.1
                                            Jan 15, 2025 02:53:18.748928070 CET50294445192.168.2.4193.32.83.1
                                            Jan 15, 2025 02:53:18.753753901 CET44550294193.32.83.1192.168.2.4
                                            Jan 15, 2025 02:53:19.377872944 CET44550069155.84.144.1192.168.2.4
                                            Jan 15, 2025 02:53:19.377960920 CET50069445192.168.2.4155.84.144.1
                                            Jan 15, 2025 02:53:19.421996117 CET50069445192.168.2.4155.84.144.1
                                            Jan 15, 2025 02:53:19.422023058 CET50069445192.168.2.4155.84.144.1
                                            Jan 15, 2025 02:53:19.426820993 CET44550069155.84.144.1192.168.2.4
                                            Jan 15, 2025 02:53:19.426839113 CET44550069155.84.144.1192.168.2.4
                                            Jan 15, 2025 02:53:19.565411091 CET4455007060.232.169.1192.168.2.4
                                            Jan 15, 2025 02:53:19.565491915 CET50070445192.168.2.460.232.169.1
                                            Jan 15, 2025 02:53:19.566329002 CET50070445192.168.2.460.232.169.1
                                            Jan 15, 2025 02:53:19.566356897 CET50070445192.168.2.460.232.169.1
                                            Jan 15, 2025 02:53:19.571206093 CET4455007060.232.169.1192.168.2.4
                                            Jan 15, 2025 02:53:19.571235895 CET4455007060.232.169.1192.168.2.4
                                            Jan 15, 2025 02:53:19.678280115 CET50315445192.168.2.460.232.169.2
                                            Jan 15, 2025 02:53:19.683132887 CET4455031560.232.169.2192.168.2.4
                                            Jan 15, 2025 02:53:19.683209896 CET50315445192.168.2.460.232.169.2
                                            Jan 15, 2025 02:53:19.683285952 CET50315445192.168.2.460.232.169.2
                                            Jan 15, 2025 02:53:19.688226938 CET4455031560.232.169.2192.168.2.4
                                            Jan 15, 2025 02:53:19.688278913 CET50315445192.168.2.460.232.169.2
                                            Jan 15, 2025 02:53:20.064248085 CET50323445192.168.2.460.232.169.2
                                            Jan 15, 2025 02:53:20.069102049 CET4455032360.232.169.2192.168.2.4
                                            Jan 15, 2025 02:53:20.069178104 CET50323445192.168.2.460.232.169.2
                                            Jan 15, 2025 02:53:20.069371939 CET50323445192.168.2.460.232.169.2
                                            Jan 15, 2025 02:53:20.074206114 CET4455032360.232.169.2192.168.2.4
                                            Jan 15, 2025 02:53:20.618647099 CET50340445192.168.2.426.174.0.1
                                            Jan 15, 2025 02:53:20.623648882 CET4455034026.174.0.1192.168.2.4
                                            Jan 15, 2025 02:53:20.623739004 CET50340445192.168.2.426.174.0.1
                                            Jan 15, 2025 02:53:20.623769045 CET50340445192.168.2.426.174.0.1
                                            Jan 15, 2025 02:53:20.628622055 CET4455034026.174.0.1192.168.2.4
                                            Jan 15, 2025 02:53:21.014981985 CET44550076169.185.83.1192.168.2.4
                                            Jan 15, 2025 02:53:21.015053034 CET50076445192.168.2.4169.185.83.1
                                            Jan 15, 2025 02:53:21.015080929 CET50076445192.168.2.4169.185.83.1
                                            Jan 15, 2025 02:53:21.015121937 CET50076445192.168.2.4169.185.83.1
                                            Jan 15, 2025 02:53:21.020025969 CET44550076169.185.83.1192.168.2.4
                                            Jan 15, 2025 02:53:21.020056009 CET44550076169.185.83.1192.168.2.4
                                            Jan 15, 2025 02:53:21.259356022 CET50362445192.168.2.4212.221.152.3
                                            Jan 15, 2025 02:53:21.264210939 CET44550362212.221.152.3192.168.2.4
                                            Jan 15, 2025 02:53:21.264343023 CET50362445192.168.2.4212.221.152.3
                                            Jan 15, 2025 02:53:21.264385939 CET50362445192.168.2.4212.221.152.3
                                            Jan 15, 2025 02:53:21.269625902 CET44550362212.221.152.3192.168.2.4
                                            Jan 15, 2025 02:53:21.559906960 CET44550080168.221.244.1192.168.2.4
                                            Jan 15, 2025 02:53:21.560098886 CET50080445192.168.2.4168.221.244.1
                                            Jan 15, 2025 02:53:21.560327053 CET50080445192.168.2.4168.221.244.1
                                            Jan 15, 2025 02:53:21.560327053 CET50080445192.168.2.4168.221.244.1
                                            Jan 15, 2025 02:53:21.565179110 CET44550080168.221.244.1192.168.2.4
                                            Jan 15, 2025 02:53:21.565196991 CET44550080168.221.244.1192.168.2.4
                                            Jan 15, 2025 02:53:21.618820906 CET50374445192.168.2.4168.221.244.2
                                            Jan 15, 2025 02:53:21.623795986 CET44550374168.221.244.2192.168.2.4
                                            Jan 15, 2025 02:53:21.623867989 CET50374445192.168.2.4168.221.244.2
                                            Jan 15, 2025 02:53:21.623895884 CET50374445192.168.2.4168.221.244.2
                                            Jan 15, 2025 02:53:21.624202967 CET50376445192.168.2.4168.221.244.2
                                            Jan 15, 2025 02:53:21.628848076 CET44550374168.221.244.2192.168.2.4
                                            Jan 15, 2025 02:53:21.628906965 CET50374445192.168.2.4168.221.244.2
                                            Jan 15, 2025 02:53:21.629040003 CET44550376168.221.244.2192.168.2.4
                                            Jan 15, 2025 02:53:21.629091024 CET50376445192.168.2.4168.221.244.2
                                            Jan 15, 2025 02:53:21.629105091 CET50376445192.168.2.4168.221.244.2
                                            Jan 15, 2025 02:53:21.633883953 CET44550376168.221.244.2192.168.2.4
                                            Jan 15, 2025 02:53:22.431349993 CET50411445192.168.2.4155.84.144.1
                                            Jan 15, 2025 02:53:22.436197996 CET44550411155.84.144.1192.168.2.4
                                            Jan 15, 2025 02:53:22.436280012 CET50411445192.168.2.4155.84.144.1
                                            Jan 15, 2025 02:53:22.436319113 CET50411445192.168.2.4155.84.144.1
                                            Jan 15, 2025 02:53:22.441133976 CET44550411155.84.144.1192.168.2.4
                                            Jan 15, 2025 02:53:22.608809948 CET44550089221.199.214.1192.168.2.4
                                            Jan 15, 2025 02:53:22.608949900 CET50089445192.168.2.4221.199.214.1
                                            Jan 15, 2025 02:53:22.608994961 CET50089445192.168.2.4221.199.214.1
                                            Jan 15, 2025 02:53:22.609033108 CET50089445192.168.2.4221.199.214.1
                                            Jan 15, 2025 02:53:22.614053965 CET44550089221.199.214.1192.168.2.4
                                            Jan 15, 2025 02:53:22.614087105 CET44550089221.199.214.1192.168.2.4
                                            Jan 15, 2025 02:53:23.951402903 CET4455009984.185.167.1192.168.2.4
                                            Jan 15, 2025 02:53:23.951997042 CET50099445192.168.2.484.185.167.1
                                            Jan 15, 2025 02:53:24.013360977 CET44550101107.95.115.1192.168.2.4
                                            Jan 15, 2025 02:53:24.013426065 CET50101445192.168.2.4107.95.115.1
                                            Jan 15, 2025 02:53:25.298655987 CET44550113131.241.79.1192.168.2.4
                                            Jan 15, 2025 02:53:25.300503016 CET50113445192.168.2.4131.241.79.1
                                            Jan 15, 2025 02:53:25.348221064 CET50101445192.168.2.4107.95.115.1
                                            Jan 15, 2025 02:53:25.348263025 CET50113445192.168.2.4131.241.79.1
                                            Jan 15, 2025 02:53:25.348330975 CET50153445192.168.2.4134.23.254.2
                                            Jan 15, 2025 02:53:25.348330021 CET50214445192.168.2.4138.194.222.2
                                            Jan 15, 2025 02:53:25.348386049 CET50119445192.168.2.4184.52.7.1
                                            Jan 15, 2025 02:53:25.348402023 CET50146445192.168.2.441.203.92.2
                                            Jan 15, 2025 02:53:25.348454952 CET50194445192.168.2.4166.216.208.2
                                            Jan 15, 2025 02:53:25.348474979 CET50228445192.168.2.4181.107.70.1
                                            Jan 15, 2025 02:53:25.348511934 CET50376445192.168.2.4168.221.244.2
                                            Jan 15, 2025 02:53:25.348557949 CET50099445192.168.2.484.185.167.1
                                            Jan 15, 2025 02:53:25.348627090 CET50126445192.168.2.453.167.126.1
                                            Jan 15, 2025 02:53:25.348653078 CET50131445192.168.2.436.159.231.2
                                            Jan 15, 2025 02:53:25.348675966 CET50137445192.168.2.4132.89.40.1
                                            Jan 15, 2025 02:53:25.348695993 CET50141445192.168.2.4119.78.29.1
                                            Jan 15, 2025 02:53:25.348727942 CET50151445192.168.2.4105.86.166.1
                                            Jan 15, 2025 02:53:25.348757029 CET50162445192.168.2.4104.62.87.1
                                            Jan 15, 2025 02:53:25.348793030 CET50171445192.168.2.431.73.20.1
                                            Jan 15, 2025 02:53:25.348802090 CET50179445192.168.2.4211.227.176.1
                                            Jan 15, 2025 02:53:25.348829985 CET50183445192.168.2.4198.7.103.1
                                            Jan 15, 2025 02:53:25.348855019 CET50188445192.168.2.4137.69.251.1
                                            Jan 15, 2025 02:53:25.348885059 CET50198445192.168.2.4125.213.129.1
                                            Jan 15, 2025 02:53:25.348908901 CET50204445192.168.2.443.143.201.1
                                            Jan 15, 2025 02:53:25.348948956 CET50241445192.168.2.4215.244.84.2
                                            Jan 15, 2025 02:53:25.348970890 CET50340445192.168.2.426.174.0.1
                                            Jan 15, 2025 02:53:25.348992109 CET50272445192.168.2.4201.23.224.2
                                            Jan 15, 2025 02:53:25.349014997 CET50257445192.168.2.4203.110.14.1
                                            Jan 15, 2025 02:53:25.349103928 CET50294445192.168.2.4193.32.83.1
                                            Jan 15, 2025 02:53:25.349133015 CET50323445192.168.2.460.232.169.2
                                            Jan 15, 2025 02:53:25.349169970 CET50362445192.168.2.4212.221.152.3
                                            Jan 15, 2025 02:53:25.349201918 CET50411445192.168.2.4155.84.144.1
                                            Jan 15, 2025 02:54:25.392447948 CET5064280192.168.2.4104.16.167.228
                                            Jan 15, 2025 02:54:25.397439003 CET8050642104.16.167.228192.168.2.4
                                            Jan 15, 2025 02:54:25.397509098 CET5064280192.168.2.4104.16.167.228
                                            Jan 15, 2025 02:54:25.397617102 CET5064280192.168.2.4104.16.167.228
                                            Jan 15, 2025 02:54:25.402399063 CET8050642104.16.167.228192.168.2.4
                                            Jan 15, 2025 02:54:25.857661963 CET8050642104.16.167.228192.168.2.4
                                            Jan 15, 2025 02:54:25.857726097 CET5064280192.168.2.4104.16.167.228
                                            Jan 15, 2025 02:54:25.857805014 CET5064280192.168.2.4104.16.167.228
                                            Jan 15, 2025 02:54:25.857856035 CET8050642104.16.167.228192.168.2.4
                                            Jan 15, 2025 02:54:25.857898951 CET5064280192.168.2.4104.16.167.228
                                            Jan 15, 2025 02:54:25.862492085 CET8050642104.16.167.228192.168.2.4
                                            Jan 15, 2025 02:54:25.867187023 CET50643445192.168.2.471.42.17.254
                                            Jan 15, 2025 02:54:25.871983051 CET4455064371.42.17.254192.168.2.4
                                            Jan 15, 2025 02:54:25.872062922 CET50643445192.168.2.471.42.17.254
                                            Jan 15, 2025 02:54:25.872154951 CET50643445192.168.2.471.42.17.254
                                            Jan 15, 2025 02:54:25.872605085 CET50644445192.168.2.471.42.17.1
                                            Jan 15, 2025 02:54:25.876962900 CET4455064371.42.17.254192.168.2.4
                                            Jan 15, 2025 02:54:25.877007008 CET50643445192.168.2.471.42.17.254
                                            Jan 15, 2025 02:54:25.877413034 CET4455064471.42.17.1192.168.2.4
                                            Jan 15, 2025 02:54:25.877475977 CET50644445192.168.2.471.42.17.1
                                            Jan 15, 2025 02:54:25.877774954 CET50644445192.168.2.471.42.17.1
                                            Jan 15, 2025 02:54:25.877966881 CET50646445192.168.2.471.42.17.1
                                            Jan 15, 2025 02:54:25.882567883 CET4455064471.42.17.1192.168.2.4
                                            Jan 15, 2025 02:54:25.882689953 CET4455064671.42.17.1192.168.2.4
                                            Jan 15, 2025 02:54:25.882744074 CET50644445192.168.2.471.42.17.1
                                            Jan 15, 2025 02:54:25.882744074 CET50646445192.168.2.471.42.17.1
                                            Jan 15, 2025 02:54:25.883001089 CET50646445192.168.2.471.42.17.1
                                            Jan 15, 2025 02:54:25.887746096 CET4455064671.42.17.1192.168.2.4
                                            Jan 15, 2025 02:54:27.869343042 CET50668445192.168.2.457.196.147.174
                                            TimestampSource PortDest PortSource IPDest IP
                                            Jan 15, 2025 02:52:18.401213884 CET6213553192.168.2.41.1.1.1
                                            Jan 15, 2025 02:52:18.409420967 CET53621351.1.1.1192.168.2.4
                                            Jan 15, 2025 02:52:22.344440937 CET138138192.168.2.4192.168.2.255
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Jan 15, 2025 02:52:18.401213884 CET192.168.2.41.1.1.10x30eaStandard query (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comA (IP address)IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Jan 15, 2025 02:52:18.409420967 CET1.1.1.1192.168.2.40x30eaNo error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.167.228A (IP address)IN (0x0001)false
                                            Jan 15, 2025 02:52:18.409420967 CET1.1.1.1192.168.2.40x30eaNo error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.166.228A (IP address)IN (0x0001)false
                                            • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            0192.168.2.449730104.16.167.228803156C:\Windows\mssecsvc.exe
                                            TimestampBytes transferredDirectionData
                                            Jan 15, 2025 02:52:18.419631004 CET100OUTGET / HTTP/1.1
                                            Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                            Cache-Control: no-cache
                                            Jan 15, 2025 02:52:18.961666107 CET778INHTTP/1.1 200 OK
                                            Date: Wed, 15 Jan 2025 01:52:18 GMT
                                            Content-Type: text/html
                                            Content-Length: 607
                                            Connection: close
                                            Server: cloudflare
                                            CF-RAY: 902239c60f494367-EWR
                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                            Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            1192.168.2.449731104.16.167.228804296C:\Windows\mssecsvc.exe
                                            TimestampBytes transferredDirectionData
                                            Jan 15, 2025 02:52:19.183681011 CET100OUTGET / HTTP/1.1
                                            Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                            Cache-Control: no-cache
                                            Jan 15, 2025 02:52:19.652614117 CET778INHTTP/1.1 200 OK
                                            Date: Wed, 15 Jan 2025 01:52:19 GMT
                                            Content-Type: text/html
                                            Content-Length: 607
                                            Connection: close
                                            Server: cloudflare
                                            CF-RAY: 902239ca6b9c41a6-EWR
                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                            Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            2192.168.2.449754104.16.167.228803684C:\Windows\mssecsvc.exe
                                            TimestampBytes transferredDirectionData
                                            Jan 15, 2025 02:52:21.350320101 CET100OUTGET / HTTP/1.1
                                            Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                            Cache-Control: no-cache
                                            Jan 15, 2025 02:52:21.841851950 CET778INHTTP/1.1 200 OK
                                            Date: Wed, 15 Jan 2025 01:52:21 GMT
                                            Content-Type: text/html
                                            Content-Length: 607
                                            Connection: close
                                            Server: cloudflare
                                            CF-RAY: 902239d8098e7289-EWR
                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                            Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                            Session IDSource IPSource PortDestination IPDestination Port
                                            3192.168.2.450642104.16.167.22880
                                            TimestampBytes transferredDirectionData
                                            Jan 15, 2025 02:54:25.397617102 CET100OUTGET / HTTP/1.1
                                            Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                            Cache-Control: no-cache
                                            Jan 15, 2025 02:54:25.857661963 CET778INHTTP/1.1 200 OK
                                            Date: Wed, 15 Jan 2025 01:54:25 GMT
                                            Content-Type: text/html
                                            Content-Length: 607
                                            Connection: close
                                            Server: cloudflare
                                            CF-RAY: 90223cdf3866ef9f-EWR
                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                            Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:20:52:17
                                            Start date:14/01/2025
                                            Path:C:\Windows\System32\loaddll32.exe
                                            Wow64 process (32bit):true
                                            Commandline:loaddll32.exe "C:\Users\user\Desktop\6fRzgDuqWT.dll"
                                            Imagebase:0xc90000
                                            File size:126'464 bytes
                                            MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:1
                                            Start time:20:52:17
                                            Start date:14/01/2025
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7699e0000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:2
                                            Start time:20:52:17
                                            Start date:14/01/2025
                                            Path:C:\Windows\SysWOW64\cmd.exe
                                            Wow64 process (32bit):true
                                            Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\6fRzgDuqWT.dll",#1
                                            Imagebase:0x240000
                                            File size:236'544 bytes
                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:3
                                            Start time:20:52:17
                                            Start date:14/01/2025
                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                            Wow64 process (32bit):true
                                            Commandline:rundll32.exe C:\Users\user\Desktop\6fRzgDuqWT.dll,PlayGame
                                            Imagebase:0x440000
                                            File size:61'440 bytes
                                            MD5 hash:889B99C52A60DD49227C5E485A016679
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:4
                                            Start time:20:52:17
                                            Start date:14/01/2025
                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                            Wow64 process (32bit):true
                                            Commandline:rundll32.exe "C:\Users\user\Desktop\6fRzgDuqWT.dll",#1
                                            Imagebase:0x440000
                                            File size:61'440 bytes
                                            MD5 hash:889B99C52A60DD49227C5E485A016679
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:5
                                            Start time:20:52:17
                                            Start date:14/01/2025
                                            Path:C:\Windows\mssecsvc.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\WINDOWS\mssecsvc.exe
                                            Imagebase:0x400000
                                            File size:3'723'264 bytes
                                            MD5 hash:8ED7F2E1AAE7A4371AA929A5EB6A6E59
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000002.1861807815.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000000.1844779969.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000002.1861978439.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000005.00000002.1861978439.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000000.1844907765.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000005.00000000.1844907765.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                            Reputation:low
                                            Has exited:true

                                            Target ID:6
                                            Start time:20:52:18
                                            Start date:14/01/2025
                                            Path:C:\Windows\mssecsvc.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\WINDOWS\mssecsvc.exe -m security
                                            Imagebase:0x400000
                                            File size:3'723'264 bytes
                                            MD5 hash:8ED7F2E1AAE7A4371AA929A5EB6A6E59
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1852650304.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2501332748.000000000042E000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1852807546.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000000.1852807546.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2501553870.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.2501553870.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2503584791.0000000002395000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.2503584791.0000000002395000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2503094839.0000000001E74000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.2503094839.0000000001E74000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                            Reputation:low
                                            Has exited:true

                                            Target ID:7
                                            Start time:20:52:19
                                            Start date:14/01/2025
                                            Path:C:\Windows\tasksche.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\WINDOWS\tasksche.exe /i
                                            Imagebase:0x400000
                                            File size:3'514'368 bytes
                                            MD5 hash:171E35FE5FD37CA850D3D1234D94E194
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000007.00000000.1860471973.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000007.00000002.1861089199.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                            • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                            • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                                            Antivirus matches:
                                            • Detection: 100%, Avira
                                            • Detection: 100%, Joe Sandbox ML
                                            • Detection: 98%, ReversingLabs
                                            Reputation:low
                                            Has exited:true

                                            Target ID:8
                                            Start time:20:52:20
                                            Start date:14/01/2025
                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                            Wow64 process (32bit):true
                                            Commandline:rundll32.exe "C:\Users\user\Desktop\6fRzgDuqWT.dll",PlayGame
                                            Imagebase:0x440000
                                            File size:61'440 bytes
                                            MD5 hash:889B99C52A60DD49227C5E485A016679
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:9
                                            Start time:20:52:20
                                            Start date:14/01/2025
                                            Path:C:\Windows\mssecsvc.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\WINDOWS\mssecsvc.exe
                                            Imagebase:0x400000
                                            File size:3'723'264 bytes
                                            MD5 hash:8ED7F2E1AAE7A4371AA929A5EB6A6E59
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000002.1883526347.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000000.1874333901.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000000.1874498033.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000000.1874498033.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000002.1883678863.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000002.1883678863.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                            Reputation:low
                                            Has exited:true

                                            Target ID:10
                                            Start time:20:52:21
                                            Start date:14/01/2025
                                            Path:C:\Windows\tasksche.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\WINDOWS\tasksche.exe /i
                                            Imagebase:0x400000
                                            File size:3'514'368 bytes
                                            MD5 hash:171E35FE5FD37CA850D3D1234D94E194
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000A.00000002.1882885243.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000A.00000000.1882223401.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                            Reputation:low
                                            Has exited:true

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:71.7%
                                              Dynamic/Decrypted Code Coverage:0%
                                              Signature Coverage:63.2%
                                              Total number of Nodes:38
                                              Total number of Limit Nodes:9
                                              execution_graph 63 409a16 __set_app_type __p__fmode __p__commode 64 409a85 63->64 65 409a99 64->65 66 409a8d __setusermatherr 64->66 75 409b8c _controlfp 65->75 66->65 68 409a9e _initterm __getmainargs _initterm 69 409af2 GetStartupInfoA 68->69 71 409b26 GetModuleHandleA 69->71 76 408140 InternetOpenA InternetOpenUrlA 71->76 75->68 77 4081a7 InternetCloseHandle InternetCloseHandle 76->77 80 408090 GetModuleFileNameA __p___argc 77->80 79 4081b2 exit _XcptFilter 81 4080b0 80->81 82 4080b9 OpenSCManagerA 80->82 91 407f20 81->91 83 408101 StartServiceCtrlDispatcherA 82->83 84 4080cf OpenServiceA 82->84 83->79 86 4080fc CloseServiceHandle 84->86 87 4080ee 84->87 86->83 96 407fa0 ChangeServiceConfig2A 87->96 90 4080f6 CloseServiceHandle 90->86 108 407c40 sprintf OpenSCManagerA 91->108 93 407f25 97 407ce0 GetModuleHandleW 93->97 96->90 98 407d01 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 97->98 99 407f08 97->99 98->99 100 407d49 98->100 99->79 100->99 101 407d69 FindResourceA 100->101 101->99 102 407d84 LoadResource 101->102 102->99 103 407d94 LockResource 102->103 103->99 104 407da7 SizeofResource 103->104 104->99 105 407db9 sprintf sprintf MoveFileExA CreateFileA 104->105 105->99 106 407e54 WriteFile CloseHandle CreateProcessA 105->106 106->99 107 407ef2 CloseHandle CloseHandle 106->107 107->99 109 407c74 CreateServiceA 108->109 110 407cca 108->110 111 407cbb CloseServiceHandle 109->111 112 407cad StartServiceA CloseServiceHandle 109->112 110->93 111->93 112->111

                                              Callgraph

                                              Control-flow Graph

                                              APIs
                                              • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F380EF0,?,00000000), ref: 00407CEF
                                              • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                              • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                              • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                              • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                              • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                              • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                              • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                              • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                              • sprintf.MSVCRT ref: 00407E01
                                              • sprintf.MSVCRT ref: 00407E18
                                              • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                              • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000004,00000000), ref: 00407E43
                                              • WriteFile.KERNELBASE(00000000,?,00000000,?,00000000), ref: 00407E61
                                              • CloseHandle.KERNELBASE(00000000), ref: 00407E68
                                              • CreateProcessA.KERNELBASE ref: 00407EE8
                                              • CloseHandle.KERNEL32(00000000), ref: 00407EF7
                                              • CloseHandle.KERNEL32(08000000), ref: 00407F02
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.1861703414.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000005.00000002.1861664246.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861759078.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861807815.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861807815.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861884659.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861978439.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861978439.000000000088B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861978439.00000000008EF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861978439.00000000008F2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861978439.00000000008FA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861978439.0000000000902000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861978439.000000000090B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861978439.0000000000915000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861978439.0000000000919000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressHandleProcResource$CloseFile$Createsprintf$FindLoadLockModuleMoveProcessSizeofWrite
                                              • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                              • API String ID: 4281112323-1507730452
                                              • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                              • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                              • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                              • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                              Control-flow Graph

                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.1861703414.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000005.00000002.1861664246.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861759078.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861807815.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861807815.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861884659.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861978439.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861978439.000000000088B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861978439.00000000008EF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861978439.00000000008F2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861978439.00000000008FA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861978439.0000000000902000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861978439.000000000090B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861978439.0000000000915000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861978439.0000000000919000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                              • String ID:
                                              • API String ID: 801014965-0
                                              • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                              • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                              • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                              • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59

                                              Control-flow Graph

                                              APIs
                                              • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                              • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                              • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                              • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                              Strings
                                              • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.1861703414.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000005.00000002.1861664246.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861759078.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861807815.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861807815.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861884659.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861978439.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861978439.000000000088B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861978439.00000000008EF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861978439.00000000008F2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861978439.00000000008FA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861978439.0000000000902000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861978439.000000000090B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861978439.0000000000915000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861978439.0000000000919000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Internet$CloseHandleOpen
                                              • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                              • API String ID: 435140893-2942426231
                                              • Opcode ID: 7bc602e844cdf910e4a24fc0389d75e4e4c0db4e5e0cdfe1b8e612c3f784a296
                                              • Instruction ID: 1dd4d323c29996ceece3d10fb5d3e331cb9ed4e1cabd62d72b2cd6c3d10c6962
                                              • Opcode Fuzzy Hash: 7bc602e844cdf910e4a24fc0389d75e4e4c0db4e5e0cdfe1b8e612c3f784a296
                                              • Instruction Fuzzy Hash: 050162715443106EE320DF648D01B6B7BE9EF85710F01082EF984E7280EAB59804876B

                                              Control-flow Graph

                                              APIs
                                              • sprintf.MSVCRT ref: 00407C56
                                              • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                              • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F380EF0,00000000), ref: 00407C9B
                                              • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                              • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                              • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.1861703414.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000005.00000002.1861664246.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861759078.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861807815.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861807815.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861884659.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861978439.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861978439.000000000088B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861978439.00000000008EF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861978439.00000000008F2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861978439.00000000008FA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861978439.0000000000902000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861978439.000000000090B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861978439.0000000000915000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861978439.0000000000919000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                              • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                              • API String ID: 3340711343-4063779371
                                              • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                              • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                              • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                              • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                              Control-flow Graph

                                              APIs
                                              • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                              • __p___argc.MSVCRT ref: 004080A5
                                              • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                              • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6F380EF0,00000000,?,004081B2), ref: 004080DC
                                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                              • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                              • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.1861703414.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000005.00000002.1861664246.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861759078.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861807815.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861807815.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861884659.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861978439.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861978439.000000000088B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861978439.00000000008EF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861978439.00000000008F2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861978439.00000000008FA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861978439.0000000000902000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861978439.000000000090B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861978439.0000000000915000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1861978439.0000000000919000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                              • String ID: mssecsvc2.0
                                              • API String ID: 4274534310-3729025388
                                              • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                              • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                              • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                              • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                              Execution Graph

                                              Execution Coverage:34.8%
                                              Dynamic/Decrypted Code Coverage:0%
                                              Signature Coverage:0%
                                              Total number of Nodes:36
                                              Total number of Limit Nodes:2

                                              Callgraph

                                              Control-flow Graph

                                              APIs
                                              • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                              • __p___argc.MSVCRT ref: 004080A5
                                              • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                              • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6F380EF0,00000000,?,004081B2), ref: 004080DC
                                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                              • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                              • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2501187198.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2501165984.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501214271.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501245802.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501245802.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501332748.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501375638.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501402923.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501553870.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501553870.000000000088B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501553870.00000000008EF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501553870.00000000008F2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501553870.00000000008FA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501553870.0000000000902000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501553870.000000000090B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501553870.0000000000915000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501553870.0000000000919000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                              • String ID: mssecsvc2.0
                                              • API String ID: 4274534310-3729025388
                                              • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                              • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                              • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                              • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                              Control-flow Graph

                                              APIs
                                              • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                              • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                              • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                              • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                              Strings
                                              • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2501187198.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2501165984.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501214271.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501245802.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501245802.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501332748.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501375638.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501402923.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501553870.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501553870.000000000088B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501553870.00000000008EF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501553870.00000000008F2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501553870.00000000008FA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501553870.0000000000902000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501553870.000000000090B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501553870.0000000000915000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501553870.0000000000919000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Internet$CloseHandleOpen
                                              • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                              • API String ID: 435140893-2942426231
                                              • Opcode ID: 7bc602e844cdf910e4a24fc0389d75e4e4c0db4e5e0cdfe1b8e612c3f784a296
                                              • Instruction ID: 1dd4d323c29996ceece3d10fb5d3e331cb9ed4e1cabd62d72b2cd6c3d10c6962
                                              • Opcode Fuzzy Hash: 7bc602e844cdf910e4a24fc0389d75e4e4c0db4e5e0cdfe1b8e612c3f784a296
                                              • Instruction Fuzzy Hash: 050162715443106EE320DF648D01B6B7BE9EF85710F01082EF984E7280EAB59804876B

                                              Control-flow Graph

                                              APIs
                                              • sprintf.MSVCRT ref: 00407C56
                                              • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                              • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F380EF0,00000000), ref: 00407C9B
                                              • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                              • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                              • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2501187198.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2501165984.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501214271.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501245802.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501245802.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501332748.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501375638.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501402923.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501553870.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501553870.000000000088B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501553870.00000000008EF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501553870.00000000008F2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501553870.00000000008FA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501553870.0000000000902000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501553870.000000000090B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501553870.0000000000915000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501553870.0000000000919000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                              • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                              • API String ID: 3340711343-4063779371
                                              • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                              • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                              • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                              • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 15 407ce0-407cfb GetModuleHandleW 16 407d01-407d43 GetProcAddress * 4 15->16 17 407f08-407f14 15->17 16->17 18 407d49-407d4f 16->18 18->17 19 407d55-407d5b 18->19 19->17 20 407d61-407d63 19->20 20->17 21 407d69-407d7e FindResourceA 20->21 21->17 22 407d84-407d8e LoadResource 21->22 22->17 23 407d94-407da1 LockResource 22->23 23->17 24 407da7-407db3 SizeofResource 23->24 24->17 25 407db9-407e4e sprintf * 2 MoveFileExA 24->25 25->17 27 407e54-407ef0 25->27 27->17 31 407ef2-407f01 27->31 31->17
                                              APIs
                                              • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F380EF0,?,00000000), ref: 00407CEF
                                              • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                              • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                              • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                              • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                              • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                              • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                              • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                              • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                              • sprintf.MSVCRT ref: 00407E01
                                              • sprintf.MSVCRT ref: 00407E18
                                              • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2501187198.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2501165984.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501214271.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501245802.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501245802.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501332748.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501375638.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501402923.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501553870.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501553870.000000000088B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501553870.00000000008EF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501553870.00000000008F2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501553870.00000000008FA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501553870.0000000000902000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501553870.000000000090B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501553870.0000000000915000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501553870.0000000000919000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressProcResource$sprintf$FileFindHandleLoadLockModuleMoveSizeof
                                              • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                              • API String ID: 4072214828-1507730452
                                              • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                              • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                              • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                              • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                              Control-flow Graph

                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2501187198.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2501165984.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501214271.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501245802.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501245802.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501332748.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501375638.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501402923.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501553870.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501553870.000000000088B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501553870.00000000008EF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501553870.00000000008F2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501553870.00000000008FA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501553870.0000000000902000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501553870.000000000090B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501553870.0000000000915000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2501553870.0000000000919000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                              • String ID:
                                              • API String ID: 801014965-0
                                              • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                              • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                              • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                              • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59
                                              APIs
                                              • memcpy.MSVCRT(?,?,0000012C,?), ref: 00406C91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.1861042933.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.1861025240.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861069607.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861089199.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.000000000057B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005E2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005EA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005F2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000609000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: memcpy
                                              • String ID: /../$/..\$\../$\..\
                                              • API String ID: 3510742995-3885502717
                                              • Opcode ID: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                                              • Instruction ID: 8d35de4500b3f4065ad8a7d009fa2f60231b6be20ed9f01f65d9d1a3966dd706
                                              • Opcode Fuzzy Hash: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                                              • Instruction Fuzzy Hash: 98D147729082459FDB15CF68C881AEABBF4EF05300F15857FE49AB7381C738A915CB98
                                              APIs
                                              • LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                              • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                                              • GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                                              • GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                                              • GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                                              • GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                                              • GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.1861042933.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.1861025240.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861069607.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861089199.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.000000000057B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005E2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005EA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005F2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000609000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressProc$LibraryLoad
                                              • String ID: CryptAcquireContextA$CryptDecrypt$CryptDestroyKey$CryptEncrypt$CryptGenKey$CryptImportKey$advapi32.dll
                                              • API String ID: 2238633743-2459060434
                                              • Opcode ID: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                              • Instruction ID: 9aae3444cc52ced5e7e1ad1d2a06d11cf911cb2b3a933a05a08c6ba10b936042
                                              • Opcode Fuzzy Hash: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                              • Instruction Fuzzy Hash: 20011E32A86311EBDB30AFA5AE856677AE4EA41750368843FB104B2DB1D7F81448DE5C
                                              APIs
                                              • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00401CFE
                                              • OpenServiceA.ADVAPI32(00000000,0040F8AC,000F01FF), ref: 00401D21
                                              • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00401D31
                                              • CloseServiceHandle.ADVAPI32(?), ref: 00401D3A
                                              • CloseServiceHandle.ADVAPI32(?), ref: 00401D9E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.1861042933.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.1861025240.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861069607.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861089199.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.000000000057B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005E2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005EA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005F2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000609000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Service$CloseHandleOpen$ManagerStart
                                              • String ID: cmd.exe /c "%s"
                                              • API String ID: 1485051382-955883872
                                              • Opcode ID: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                              • Instruction ID: 93977d8af42d47d1d9866270745c8e9c50065656b45fe828c5c40e24baaa5e60
                                              • Opcode Fuzzy Hash: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                              • Instruction Fuzzy Hash: 6411AF71900118BBDB205B659E4CE9FBF7CEF85745F10407AF601F21A0CA744949DB68
                                              APIs
                                              • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402A95
                                              • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402AA4
                                              • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402ACD
                                              • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402ADC
                                              • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402AFF
                                              • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402B0E
                                              • memcpy.MSVCRT(?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B2A
                                              • memcpy.MSVCRT(?,?,?,?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B3F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.1861042933.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.1861025240.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861069607.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861089199.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.000000000057B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005E2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005EA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005F2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000609000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ??0exception@@ExceptionThrow$memcpy
                                              • String ID:
                                              • API String ID: 1881450474-3916222277
                                              • Opcode ID: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                                              • Instruction ID: fcfef073648f46ce18afaeffe4143d5033c2e410e09e17396796de68d512254b
                                              • Opcode Fuzzy Hash: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                                              • Instruction Fuzzy Hash: 8DD1C3706006099FDB28CF29C5846EA77F5FF48314F14C43EE95AEB281D778AA85CB58
                                              APIs
                                              • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040150D
                                              • GetFileSizeEx.KERNEL32(00000000,?), ref: 00401529
                                              • memcmp.MSVCRT(?,WANACRY!,00000008), ref: 00401572
                                              • GlobalAlloc.KERNEL32(00000000,?,?,?,00000010,?,?,?,?), ref: 0040166D
                                              • _local_unwind2.MSVCRT(?,000000FF), ref: 004016D6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.1861042933.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.1861025240.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861069607.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861089199.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.000000000057B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005E2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005EA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005F2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000609000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: File$AllocCreateGlobalSize_local_unwind2memcmp
                                              • String ID: WANACRY!
                                              • API String ID: 283026544-1240840912
                                              • Opcode ID: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                                              • Instruction ID: 23909f9b909e50c20e483d6bc4be6e23e355ec3bf8b0a6de4718622c8bde6caa
                                              • Opcode Fuzzy Hash: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                                              • Instruction Fuzzy Hash: 6E512C71900209ABDB219F95CD84FEEB7BCEB08790F1444BAF515F21A0D739AA45CB28
                                              APIs
                                              • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403528
                                              • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403537
                                              • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B51,?,?), ref: 004036A9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.1861042933.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.1861025240.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861069607.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861089199.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.000000000057B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005E2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005EA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005F2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000609000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ??0exception@@ExceptionThrowmemcpy
                                              • String ID: $Q;@
                                              • API String ID: 2382887404-262343263
                                              • Opcode ID: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                                              • Instruction ID: bc36c6e363c45e845c5013d3ee32ff29fee655b638a1b5d52e43d816bbd12583
                                              • Opcode Fuzzy Hash: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                                              • Instruction Fuzzy Hash: A581C3759002499FCB05CF68C9809EEBBF5EF89308F2484AEE595E7352C234BA45CF58
                                              APIs
                                              • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037B0
                                              • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037BF
                                              • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?), ref: 00403937
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.1861042933.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.1861025240.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861069607.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861089199.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.000000000057B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005E2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005EA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005F2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000609000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ??0exception@@ExceptionThrowmemcpy
                                              • String ID:
                                              • API String ID: 2382887404-3916222277
                                              • Opcode ID: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                                              • Instruction ID: 1cfba4d829132d5223a2741c68a06c6b284a50eb41fad236877f379c856cacdf
                                              • Opcode Fuzzy Hash: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                                              • Instruction Fuzzy Hash: B991C375A002499FCB05CF69C480AEEBBF5FF89315F2480AEE595E7342C234AA45CF58
                                              APIs
                                              • free.MSVCRT(?,00402198,00000000,00000000,0040243C,00000000), ref: 00402A15
                                              • GetProcessHeap.KERNEL32(00000000,00000000,00000000,00000000,0040243C,00000000), ref: 00402A36
                                              • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 00402A3D
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.1861042933.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.1861025240.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861069607.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861089199.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.000000000057B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005E2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005EA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005F2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000609000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap$FreeProcessfree
                                              • String ID:
                                              • API String ID: 3428986607-0
                                              • Opcode ID: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                              • Instruction ID: 6307eaad725422957632c7c85bafc458d1caddc7471a2505469f2591130cc2ff
                                              • Opcode Fuzzy Hash: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                              • Instruction Fuzzy Hash: C4010C72600A019FCB309FA5DE88967B7E9FF48321354483EF196A2591CB75F841CF58
                                              APIs
                                              • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402E98
                                              • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402EA7
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.1861042933.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.1861025240.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861069607.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861089199.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.000000000057B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005E2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005EA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005F2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000609000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ??0exception@@ExceptionThrow
                                              • String ID:
                                              • API String ID: 941485209-0
                                              • Opcode ID: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                              • Instruction ID: 7c46eb61736c4a52f21da4615b0110659747632e7974af7727d2e67ead4b8ec0
                                              • Opcode Fuzzy Hash: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                              • Instruction Fuzzy Hash: 01B1AD75A081D99EDB05CFB989A04EAFFF2AF4E20474ED1E9C5C4AB313C5306505DB98
                                              APIs
                                              • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031D6
                                              • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031E5
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.1861042933.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.1861025240.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861069607.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861089199.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.000000000057B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005E2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005EA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005F2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000609000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ??0exception@@ExceptionThrow
                                              • String ID:
                                              • API String ID: 941485209-0
                                              • Opcode ID: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                              • Instruction ID: bcf4991698fce177fafabfcfbf4d003d7da0a1e91b0dfae35dbc96c431f9713a
                                              • Opcode Fuzzy Hash: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                              • Instruction Fuzzy Hash: 43B1A135A081D99EDB05CFB984A04EAFFF2AF8E200B4ED1E6C9D4AB713C5705615DB84
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.1861042933.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.1861025240.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861069607.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861089199.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.000000000057B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005E2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005EA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005F2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000609000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: memcpy
                                              • String ID:
                                              • API String ID: 3510742995-0
                                              • Opcode ID: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                                              • Instruction ID: 90343a8667ee0670e87e021bba3e221c8adc0c1da1bb1a76252bfdf766af77e9
                                              • Opcode Fuzzy Hash: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                                              • Instruction Fuzzy Hash: FB520CB5900609EFCB14CF69C580AAABBF1FF49315F10852EE95AA7780D338EA55CF44
                                              APIs
                                              • CryptReleaseContext.ADVAPI32(?,00000000,?,004013DB,?,?,?,0040139D,?,?,00401366), ref: 004018EA
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.1861042933.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.1861025240.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861069607.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861089199.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.000000000057B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005E2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005EA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005F2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000609000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ContextCryptRelease
                                              • String ID:
                                              • API String ID: 829835001-0
                                              • Opcode ID: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                              • Instruction ID: 2349b07d823645f04250185dd133334db1216db109592f97c32ed3e6f6040a2b
                                              • Opcode Fuzzy Hash: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                              • Instruction Fuzzy Hash: C7E0ED323147019BEB30AB65ED49B5373E8AF00762F04C83DB05AE6990CBB9E8448A58
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.1861042933.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.1861025240.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861069607.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861089199.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.000000000057B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005E2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005EA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005F2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000609000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                              • Instruction ID: 9637f4fcf05056c634a246d4ec164b1eccd92df816b65a9601eba7856632ad8a
                                              • Opcode Fuzzy Hash: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                              • Instruction Fuzzy Hash: 36D1F5B1A002199FDF14CFA9D9805EDBBB1FF88314F25826AD959B7390D734AA41CB84
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.1861042933.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.1861025240.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861069607.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861089199.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.000000000057B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005E2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005EA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005F2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000609000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                              • Instruction ID: 3f72058ef88e406f14a8e4c5cd972b2546dbbe82ce95f55f9558457d0f17cbf0
                                              • Opcode Fuzzy Hash: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                              • Instruction Fuzzy Hash: 8E31A133E285B207C3249EBA5C4006AF6D2AB4A125B4A8775DE88F7355E128EC96C6D4
                                              APIs
                                                • Part of subcall function 00401A45: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                                • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                                                • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                                                • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                                                • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                                                • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                                                • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                                              • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0040172C
                                              • GetProcAddress.KERNEL32(00000000,CreateFileW), ref: 00401749
                                              • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00401756
                                              • GetProcAddress.KERNEL32(00000000,ReadFile), ref: 00401763
                                              • GetProcAddress.KERNEL32(00000000,MoveFileW), ref: 00401770
                                              • GetProcAddress.KERNEL32(00000000,MoveFileExW), ref: 0040177D
                                              • GetProcAddress.KERNEL32(00000000,DeleteFileW), ref: 0040178A
                                              • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00401797
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.1861042933.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.1861025240.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861069607.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861089199.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.000000000057B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005E2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005EA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005F2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000609000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressProc$LibraryLoad
                                              • String ID: CloseHandle$CreateFileW$DeleteFileW$MoveFileExW$MoveFileW$ReadFile$WriteFile$kernel32.dll
                                              • API String ID: 2238633743-1294736154
                                              • Opcode ID: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                              • Instruction ID: c344c10c919c95db3ecd10b94979b50738023765c799e55a58251b06a1d00095
                                              • Opcode Fuzzy Hash: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                              • Instruction Fuzzy Hash: D9118E729003059ACB30BF73AE84A577AF8A644751B64483FE501B3EF0D77894499E1E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.1861042933.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.1861025240.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861069607.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861089199.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.000000000057B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005E2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005EA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005F2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000609000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID:
                                              • String ID: %s%s$%s%s%s$:$\
                                              • API String ID: 0-1100577047
                                              • Opcode ID: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                                              • Instruction ID: 622825bbce38b7500016b977d00db7372d85e5c8e1565b3adbba59f792ee02a2
                                              • Opcode Fuzzy Hash: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                                              • Instruction Fuzzy Hash: 42A12A31C082049BDB319F14CC44BEA7BA9AB01314F2445BFF895B62D1D73DBA95CB5A
                                              APIs
                                              • __p___argv.MSVCRT(0040F538), ref: 00402040
                                              • strcmp.MSVCRT(?), ref: 0040204B
                                              • CopyFileA.KERNEL32(?,tasksche.exe), ref: 0040206F
                                              • GetFileAttributesA.KERNEL32(tasksche.exe), ref: 00402076
                                                • Part of subcall function 00401F5D: GetFullPathNameA.KERNEL32(tasksche.exe,00000208,?,00000000), ref: 00401F97
                                              • strrchr.MSVCRT(?,0000005C,?,?,00000000), ref: 0040209D
                                              • strrchr.MSVCRT(?,0000005C), ref: 004020AE
                                              • SetCurrentDirectoryA.KERNEL32(?,00000000), ref: 004020BB
                                                • Part of subcall function 00401B5F: MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                                                • Part of subcall function 00401B5F: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                                • Part of subcall function 00401B5F: swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                                • Part of subcall function 00401B5F: GetFileAttributesW.KERNEL32(?), ref: 00401C10
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.1861042933.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.1861025240.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861069607.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861089199.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.000000000057B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005E2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005EA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005F2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000609000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: File$AttributesDirectorystrrchr$ByteCharCopyCurrentFullMultiNamePathWideWindows__p___argvstrcmpswprintf
                                              • String ID: TaskStart$attrib +h .$icacls . /grant Everyone:F /T /C /Q$t.wnry$tasksche.exe
                                              • API String ID: 1074704982-2844324180
                                              • Opcode ID: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                                              • Instruction ID: 0f1cc1f94130967d107883c1ee7151828ebb686b55f89e1ef1b9593e139f0a32
                                              • Opcode Fuzzy Hash: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                                              • Instruction Fuzzy Hash: 25318172500319AEDB24B7B19E89E9F376C9F10319F20057FF645F65E2DE788D488A28
                                              APIs
                                              • wcscat.MSVCRT(?,WanaCrypt0r,?,0000DDB6), ref: 0040114B
                                              • RegCreateKeyW.ADVAPI32(80000001,?,00000000), ref: 0040117A
                                              • GetCurrentDirectoryA.KERNEL32(00000207,?), ref: 0040119A
                                              • strlen.MSVCRT(?), ref: 004011A7
                                              • RegSetValueExA.ADVAPI32(00000000,0040E030,00000000,00000001,?,00000001), ref: 004011BD
                                              • RegQueryValueExA.ADVAPI32(00000000,0040E030,00000000,00000000,?,?), ref: 004011E4
                                              • SetCurrentDirectoryA.KERNEL32(?), ref: 004011FA
                                              • RegCloseKey.ADVAPI32(00000000), ref: 00401203
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.1861042933.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.1861025240.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861069607.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861089199.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.000000000057B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005E2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005EA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005F2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000609000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CurrentDirectoryValue$CloseCreateQuerystrlenwcscat
                                              • String ID: 0@$Software\$WanaCrypt0r
                                              • API String ID: 865909632-3421300005
                                              • Opcode ID: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                              • Instruction ID: 752dd9e6153134350df00ddc45e524be7a8e60cbe47ba2191db59f61a0b32c4f
                                              • Opcode Fuzzy Hash: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                              • Instruction Fuzzy Hash: 09316232801228EBDB218B90DD09BDEBB78EB44751F1140BBE645F6190CB745E84CBA8
                                              APIs
                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                                              • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                              • swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                              • GetFileAttributesW.KERNEL32(?), ref: 00401C10
                                              • swprintf.MSVCRT(?,%s\Intel,?), ref: 00401C53
                                              • GetTempPathW.KERNEL32(00000104,?), ref: 00401C97
                                              • wcsrchr.MSVCRT(?,0000005C), ref: 00401CAC
                                              • wcsrchr.MSVCRT(?,0000005C), ref: 00401CBD
                                                • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                                                • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                                                • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                                                • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.1861042933.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.1861025240.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861069607.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861089199.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.000000000057B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005E2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005EA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005F2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000609000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Directory$CreateCurrentswprintfwcsrchr$AttributesByteCharFileMultiPathTempWideWindows
                                              • String ID: %s\Intel$%s\ProgramData
                                              • API String ID: 3806094219-198707228
                                              • Opcode ID: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                                              • Instruction ID: 4ac525b1174630586dc3f01422198d44c3eaba501bd80531e66e43f198221a67
                                              • Opcode Fuzzy Hash: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                                              • Instruction Fuzzy Hash: 2C41447294021DAAEF609BA0DD45FDA777CAF04310F1045BBE608F71E0EA74DA888F59
                                              APIs
                                                • Part of subcall function 00402457: SetLastError.KERNEL32(0000000D,00402200,?!@,00000040,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402463
                                              • SetLastError.KERNEL32(000000C1,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402219
                                              • GetModuleHandleA.KERNEL32(kernel32.dll,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402291
                                              • GetProcessHeap.KERNEL32(00000008,0000003C,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2), ref: 00402313
                                              • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 0040231A
                                              • memcpy.MSVCRT(00000000,?,8328EC83,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3), ref: 004023A7
                                                • Part of subcall function 00402470: memset.MSVCRT(?,00000000,?), ref: 004024D5
                                              • SetLastError.KERNEL32(0000045A), ref: 00402430
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.1861042933.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.1861025240.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861069607.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861089199.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.000000000057B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005E2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005EA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005F2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000609000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ErrorLast$Heap$AllocHandleModuleProcessmemcpymemset
                                              • String ID: ?!@$GetNativeSystemInfo$kernel32.dll
                                              • API String ID: 1900561814-3657104962
                                              • Opcode ID: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                                              • Instruction ID: 3b750285519b5b92c664dbe57bf04ddc7e4262fbacbc213f0015b22f99412f1c
                                              • Opcode Fuzzy Hash: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                                              • Instruction Fuzzy Hash: 0A81AD71A01602AFDB209FA5CE49AAB77E4BF08314F10443EF945E76D1D7B8E851CB98
                                              APIs
                                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                                              • GetFileAttributesW.KERNEL32(?), ref: 00401B2C
                                              • SetFileAttributesW.KERNEL32(?,00000000), ref: 00401B36
                                              • swprintf.MSVCRT(?,%s\%s,?,?), ref: 00401B4E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.1861042933.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.1861025240.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861069607.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861089199.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.000000000057B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005E2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005EA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005F2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000609000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Directory$AttributesCreateCurrentFile$swprintf
                                              • String ID: %s\%s
                                              • API String ID: 1036847564-4073750446
                                              • Opcode ID: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                              • Instruction ID: 4a0a9b6f0974b2b783bf1fd4f993800d593798a72c4fd06372b86497b3864b36
                                              • Opcode Fuzzy Hash: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                              • Instruction Fuzzy Hash: 99F06271200208BBEB103F65DE44F9B3B2CEB457A5F015832FA46B61A1DB75A855CAB8
                                              APIs
                                              • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,00000044,?), ref: 004010A8
                                              • WaitForSingleObject.KERNEL32(?,?), ref: 004010BD
                                              • TerminateProcess.KERNEL32(?,000000FF), ref: 004010CC
                                              • GetExitCodeProcess.KERNEL32(?,?), ref: 004010DD
                                              • CloseHandle.KERNEL32(?), ref: 004010EC
                                              • CloseHandle.KERNEL32(?), ref: 004010F1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.1861042933.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.1861025240.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861069607.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861089199.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.000000000057B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005E2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005EA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005F2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000609000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Process$CloseHandle$CodeCreateExitObjectSingleTerminateWait
                                              • String ID: D
                                              • API String ID: 786732093-2746444292
                                              • Opcode ID: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                              • Instruction ID: fabf2a0aaa91e867d54492d1ca24e81fc8ed090543e33b3e61fa812da4358066
                                              • Opcode Fuzzy Hash: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                              • Instruction Fuzzy Hash: 8D116431900229ABDB218F9ADD04ADFBF79FF04720F008426F514B65A0DB708A18DAA8
                                              APIs
                                              • __set_app_type.MSVCRT(00000002), ref: 004077E7
                                              • __p__fmode.MSVCRT ref: 004077FC
                                              • __p__commode.MSVCRT ref: 0040780A
                                              • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                                              • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                                              • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.1861042933.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.1861025240.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861069607.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861089199.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.000000000057B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005E2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005EA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005F2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000609000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: _initterm$__getmainargs__p__commode__p__fmode__set_app_type
                                              • String ID:
                                              • API String ID: 3626615345-0
                                              • Opcode ID: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                                              • Instruction ID: 63d29f1c4e41429a3497612c8de1f509d91e94429ea3a2aefb8dc74a018e4fb3
                                              • Opcode Fuzzy Hash: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                                              • Instruction Fuzzy Hash: 51318BB1D04344AFDB20AFA5DE49F5A7BA8BB05710F10463EF541B72E0CB786805CB59
                                              APIs
                                              • __setusermatherr.MSVCRT(0040793C), ref: 00407836
                                                • Part of subcall function 0040792A: _controlfp.MSVCRT(00010000,00030000,00407842), ref: 00407934
                                              • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                                              • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                                              • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                                              • GetStartupInfoA.KERNEL32(?), ref: 004078BE
                                              • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 004078E2
                                              • exit.MSVCRT(00000000,00000000,?,?,?,?), ref: 004078F2
                                              • _XcptFilter.MSVCRT(?,?,?,?,?,?), ref: 00407904
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.1861042933.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.1861025240.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861069607.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861089199.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.000000000057B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005E2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005EA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005F2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000609000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__setusermatherr_controlfpexit
                                              • String ID:
                                              • API String ID: 2141228402-0
                                              • Opcode ID: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                                              • Instruction ID: 738ed170af38765147f9c33b7b7214e7a7d60aeb9597ff7827fffae83538cc25
                                              • Opcode Fuzzy Hash: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                                              • Instruction Fuzzy Hash: F52135B2C04258AEEB20AFA5DD48AAD7BB8AF05304F24443FF581B7291D7786841CB59
                                              APIs
                                              • IsBadReadPtr.KERNEL32(00000000,00000014,00000000,00000001,00000000,?!@,004023F5,00000000), ref: 00402812
                                              • realloc.MSVCRT(85000001,317459C0), ref: 00402854
                                              • IsBadReadPtr.KERNEL32(-00000014,00000014), ref: 004028DC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.1861042933.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.1861025240.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861069607.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861089199.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.000000000057B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005E2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005EA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005F2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000609000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Read$realloc
                                              • String ID: ?!@
                                              • API String ID: 1241503663-708128716
                                              • Opcode ID: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                              • Instruction ID: b911edbb3638e6438919fa35cb7379f64586f657f287b8edbc273cd359ebb62a
                                              • Opcode Fuzzy Hash: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                              • Instruction Fuzzy Hash: 4841AE76A00205EFDB109F55CE49B5ABBF4FF44310F24803AE846B62D1D7B8E900DB59
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.1861042933.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.1861025240.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861069607.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861089199.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.000000000057B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005E2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005EA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005F2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000609000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: rand$wcslen$ComputerNamesrand
                                              • String ID:
                                              • API String ID: 3058258771-0
                                              • Opcode ID: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                              • Instruction ID: 153b78e0bdef4b648922335b0398b7079fc1e42e5dbb3c53d325bf346215f47a
                                              • Opcode Fuzzy Hash: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                              • Instruction Fuzzy Hash: FA212833A00318ABD7119B65ED81BDD77A8EB45354F1100BBF948F71C0CA759EC28BA8
                                              APIs
                                              • GetFileAttributesA.KERNEL32(?,?,?), ref: 00407083
                                              • CreateDirectoryA.KERNEL32(?,00000000), ref: 00407091
                                              • memcpy.MSVCRT(?,0000002F,0000002F,?,?,?), ref: 004070CA
                                              • strcpy.MSVCRT(00000000,?,?,?), ref: 004070FB
                                              • strcat.MSVCRT(00000000,0000002F,?,?), ref: 0040710A
                                              • GetFileAttributesA.KERNEL32(00000000,?,?), ref: 00407118
                                              • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 0040712C
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.1861042933.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.1861025240.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861069607.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861089199.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.000000000057B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005E2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005EA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005F2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000609000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AttributesCreateDirectoryFile$memcpystrcatstrcpy
                                              • String ID:
                                              • API String ID: 2935503933-0
                                              • Opcode ID: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                                              • Instruction ID: 50ba023859918e707bf45bf33fbe73a6a33da9a39eec2eddc6b78618a8cc3524
                                              • Opcode Fuzzy Hash: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                                              • Instruction Fuzzy Hash: 1A112B72C0821456CB305B749D88FD7776C9B11320F1403BBE595B32C2DA78BD898669
                                              APIs
                                              • sprintf.MSVCRT(?,%s%d,Global\MsWinZonesCacheCounterMutexA,00000000), ref: 00401F16
                                              • OpenMutexA.KERNEL32(00100000,00000001,?), ref: 00401F31
                                              • Sleep.KERNEL32(000003E8), ref: 00401F40
                                              • CloseHandle.KERNEL32(00000000), ref: 00401F52
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.1861042933.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.1861025240.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861069607.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861089199.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.000000000057B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005E2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005EA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005F2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000609000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CloseHandleMutexOpenSleepsprintf
                                              • String ID: %s%d$Global\MsWinZonesCacheCounterMutexA
                                              • API String ID: 2780352083-2959021817
                                              • Opcode ID: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                              • Instruction ID: f4a3b48a0bafa41ae68b0177be176e29d76f271436d11399ade0a1af8f7a19ee
                                              • Opcode Fuzzy Hash: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                              • Instruction Fuzzy Hash: 92F0E931A40305BBDB20EBA49E4AB9B7758AB04B40F104036F945FA0D2DBB8D54586D8
                                              APIs
                                              • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00000001), ref: 00403A91
                                              • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403AA0
                                              • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B00
                                              • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B68
                                              • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F574,?,?,?,?,?,00000001), ref: 00403BC2
                                              • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403BD1
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.1861042933.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.1861025240.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861069607.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861089199.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.000000000057B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005E2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005EA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005F2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000609000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ??0exception@@ExceptionThrowmemcpy
                                              • String ID:
                                              • API String ID: 2382887404-0
                                              • Opcode ID: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                                              • Instruction ID: 9805a50700f74263afb1320d00d27f30e93ca80038ec105a2d2f515762341bf2
                                              • Opcode Fuzzy Hash: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                                              • Instruction Fuzzy Hash: 8541C870B40206ABDB14DE65DD81D9B77BEEB84309B00443FF815B3281D778AB15C759
                                              APIs
                                              • fopen.MSVCRT(c.wnry,0040E018), ref: 0040101B
                                              • fread.MSVCRT(?,0000030C,00000001,00000000), ref: 0040103F
                                              • fwrite.MSVCRT(?,0000030C,00000001,00000000), ref: 00401047
                                              • fclose.MSVCRT(00000000), ref: 00401058
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.1861042933.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.1861025240.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861069607.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861089199.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.000000000057B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005E2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005EA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005F2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000609000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: fclosefopenfreadfwrite
                                              • String ID: c.wnry
                                              • API String ID: 4000964834-3240288721
                                              • Opcode ID: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                              • Instruction ID: 4fc4ee2583eead98f325da0eb4a8e2a7a7827d82b7f69226d67b1691b23a23d5
                                              • Opcode Fuzzy Hash: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                              • Instruction Fuzzy Hash: 0CF05931204260ABCA301F656D4AA277B10DBC4F61F10083FF1C1F40E2CABD44C296BE
                                              APIs
                                              • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040193A
                                              • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040194A
                                              • GlobalAlloc.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 00401964
                                              • ReadFile.KERNEL32(000000FF,00000000,00000000,?,00000000,?,?,?,?,?,?,00401448,?), ref: 0040197D
                                              • _local_unwind2.MSVCRT(?,000000FF,?,?,?,?,?,?,00401448,?), ref: 004019A6
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.1861042933.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.1861025240.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861069607.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861089199.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.000000000057B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005E2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005EA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005F2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000609000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: File$AllocCreateGlobalReadSize_local_unwind2
                                              • String ID:
                                              • API String ID: 2811923685-0
                                              • Opcode ID: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                                              • Instruction ID: fb063a64e2dc49fc25d010f75d45645ced701e765f932c996de96a45c5b9f027
                                              • Opcode Fuzzy Hash: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                                              • Instruction Fuzzy Hash: B62160B1901624AFCB209B99CD48FDF7E78EB097B0F54022AF525B22E0D7785805C6AC
                                              APIs
                                              • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001), ref: 00405BFE
                                              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000), ref: 00405C29
                                              • ??2@YAPAXI@Z.MSVCRT(00000020,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000,004020D5,?), ref: 00405C38
                                              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA), ref: 00405C8A
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.1861042933.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.1861025240.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861069607.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861089199.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.000000000057B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005E2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005EA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005F2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000609000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: File$Pointer$??2@Create
                                              • String ID:
                                              • API String ID: 1331958074-0
                                              • Opcode ID: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                              • Instruction ID: 771dcc1d5a31089dd4cc2aab62cbbe5a226dda330bf0289da8f54b52fc8588cb
                                              • Opcode Fuzzy Hash: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                              • Instruction Fuzzy Hash: 0831F231008784AFDB318F28888479BBBF4EF15350F18896EF491A7380C375AD85CB69
                                              APIs
                                              • _stricmp.MSVCRT(P!@,?,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 00402989
                                              • SetLastError.KERNEL32(0000007F,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 004029A7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.1861042933.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.1861025240.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861069607.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861089199.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.000000000057B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005E2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005EA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005F2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000609000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ErrorLast_stricmp
                                              • String ID: P!@
                                              • API String ID: 1278613211-1774101457
                                              • Opcode ID: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                                              • Instruction ID: aaf1e2d36ba78ebe43aa6e6aad127835d86855a49192f4e92224227a9dbc2408
                                              • Opcode Fuzzy Hash: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                                              • Instruction Fuzzy Hash: 432180B1700605EFDB14CF19DA8486A73F6EF89310B29857AE846EB381D678ED41CB85
                                              APIs
                                              • strcmp.MSVCRT(?,c.wnry,?,00000000,?), ref: 00401E5B
                                              • GetFileAttributesA.KERNEL32(?), ref: 00401E6E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.1861042933.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.1861025240.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861069607.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861089199.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.000000000057B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005E2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005EA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005F2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000609000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AttributesFilestrcmp
                                              • String ID: c.wnry
                                              • API String ID: 3324900478-3240288721
                                              • Opcode ID: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                                              • Instruction ID: 6f95607eaad4b3b0c5796a2914108af7bfa48759f01996e65d2c9759274caab0
                                              • Opcode Fuzzy Hash: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                                              • Instruction Fuzzy Hash: 3001C872D041142ADB209625DC41FEF336C9B45374F1005B7FA44F11C1E739AA998ADA
                                              APIs
                                              • CloseHandle.KERNEL32(?,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CB6
                                              • ??3@YAXPAX@Z.MSVCRT(00000000,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CBD
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.1861042933.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.1861025240.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861069607.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861089199.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.000000000057B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005E2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005EA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005F2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000609000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ??3@CloseHandle
                                              • String ID: $l@
                                              • API String ID: 3816424416-2140230165
                                              • Opcode ID: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                                              • Instruction ID: 673c02d0cae411eac5e44946f87937de45fd09569792d44698d585129e0307c2
                                              • Opcode Fuzzy Hash: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                                              • Instruction Fuzzy Hash: 47D05E3280DE211BE7226A28B90469B2B949F01330F054A6EE4A1A25E2D7789C8596CC
                                              APIs
                                              • EnterCriticalSection.KERNEL32(?,00000000,?,?,00401642,?,?,?,?), ref: 004019F2
                                              • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A13
                                              • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A1D
                                              • memcpy.MSVCRT(?,?,?,?,?,00401642,?,?,?,?), ref: 00401A2C
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.1861042933.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.1861025240.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861069607.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861089199.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.000000000057B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005E2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005EA000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005F2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.00000000005FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000605000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.1861105115.0000000000609000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CriticalSection$Leave$Entermemcpy
                                              • String ID:
                                              • API String ID: 3435569088-0
                                              • Opcode ID: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                                              • Instruction ID: 582611ac2dab466912340a9d1f37a03f8b1d3421f3d1388c7c0078807ea36f1a
                                              • Opcode Fuzzy Hash: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                                              • Instruction Fuzzy Hash: 7FF0A432200204FFEB119F90DD05FAA3769EF44710F008439F945AA1A0D7B5A854DB65